You are on page 1of 199

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/372217044

FAI-Conference Proceedings International Conference on Engineering


, Mathematical and Computational Intelligence Editors

Conference Paper · December 2019

CITATIONS READS

0 172

3 authors, including:

Chai Ching Tan


Rajamangala University of Technology Rattanakosin
230 PUBLICATIONS 596 CITATIONS

SEE PROFILE

All content following this page was uploaded by Chai Ching Tan on 08 July 2023.

The user has requested enhancement of the downloaded file.


ISBN : 978-81-945631-7-4

FAI-Conference Proceedings
(VOL: 2, 2020)

International Conference on
Engineering , Mathematical
and Computational Intelligence
(ICEMCI 2019)
DEC, 21 - 23 | 2019
Jabalpur, Madhya Pradesh, India

Editors
Pankaj Srivastava
C.C. Tan
Disclaimer
The responsibility for opinions expressed, in articles, studies and other
contributions in this publication rests solely with their authors, and this
publication does not constitute an endorsement by the ICEMCI 2019 of the
opinions so expressed in them.

Conference Proceedings of FAI 2020, Vol 2


Edited by

• Prof. Pankaj Srivastava


General Secretary, FAI
Professor & Former Head, Dept. of Mathematics
M.N. National Institute of Technology
Prayagraj, INDIA

• Dr. C.C. Tan


Vice Precedent, FAI
School of Management, Mae Fah Luang University
Chaing Rai, Thailand.

ISBN :978-81-945631-7-4

Copyright @ 2020 FAI


Published by FAI Publications, Lucknow, India
Tel: +919125755559
Email: faipublications@gmail.com , managingeditorfai@gmail.com
Website: www.faipublications.com

1
Organized By
• FATER Academy of India
• Jabalpur Engineering College, Jabalpur, Madhya Pradesh, India
• Walchand Engineering College, Sangli, Maharashtra, India

ICEMCI 2019 Committee


International Coordination Committee
• Prof. Pankaj Srivastava, General Secretary, FATER Academy of India
• Prof. Albert Faessler, University of Applied Sciences, Switzerland
• Prof. C. C. Tan, School of Management, Mae Fah Luang University, Thailand
• Dr. Yannakorn Toprayoon, Rajapark Institute, Thailand
• Prof. Georgia Irina Oros, Faculty of Sciences, University of Oradea
• Prof. AliA.AL-Zarah , Dean ,Sur University College , Oman
• Prof. Dr. Shulan Zhao, Deputy Director ,International Collaborations Office
• Yunnan Academy Social Sciences, Kunming, YunnanProvince, China
• Dr. Liliana Guran, Department of Mathematics, Romania
• Prof. Er. Meng Joo, Nanyang Technological University, Singapore
• Prof. Olina Cherniavska, Head, ISEI, Kiev, Ukraine
• Dr. Phipat Nonthanathorn, President, The Association of Researchers of Thailand

International Advisory Committee


• Prof. Valentina Balas, Univ. of Arad, Romania
• Prof. Irina Perfiljeva, University of Ostrava, Czechoslovakia
• Prof. Martin Stepnicka, University of Ostrava, Czechoslovakia
• Prof. Emilia Fridman, Tel Aviv University, Israel
• Prof. M. M. Gupta, University of Saskatchewan, Canada
• Prof. Jaideep Vaidya, Rutgers University, USA
• Prof. Ravindra Pandey , Michigan Technological University, USA
• Prof. Sven Leyffer, Argonne National Laboratory, USA
• Prof. Arvind Nema, IIT Delhi
• Prof. P. K. Srivastava, Vice President, National Industrial Corporation, Kolkata, India
• Prof. N. Anbazhagan, Alagappa University, Karaikudi, Tamilnadu
• Prof. Wei-Shih Du, National Kaohsiung Normal University, Taiwan
• Prof. Rajeev Srivastava, IIT BHU
• Prof. T Som, IIT BHU
• Prof. Y.M. Desai, IIT, Bombay
• Prof.A.K.Tripathi, IITBHU
• Prof S P Yadav, IIT Roorkee
• Prof K R Pardashani, MANIT Bhopal
• Prof Neeru Adlakha, SVNIT Surat

2
• Prof Manu Sood, HPU, Shimla
• Er. Vinay Thakur, Ministry of Electronics and IT, Govt. of India
• Lt. Gen. A. T. Parnaik, Pune, India
• Brig. Praveen Kumar, Pune, India
• Maj. Gen. M. P. Singh, Vice President, FAI
• Prof. B. K. Koushik , IIT Roorkee
• Prof. Sameer Khandekar, IIIT Kanpur
• Prof. Tripti Jain, IIT INDORE
• Prof. Indraneel Sen , IIT Kharagpur
• Prof. C.P.Gupta, IIT Roorkee
• Prof. Satyendra Narayana, Sheridan Institute of Technology, Ontario Canada
• Dr. Poom Kumam, KMUTT Bangkok
• Prof. Uday Khedkar, IIT, Bombay
• Prof. N.K.Samadiya , IIT, Roorkee
• Prof. Seema Saxena, SPIU, BHOPAL
• Prof. L. M. Thivagar, M. K. University, Madurai, India
• Prof Rajiv Saxena, JP University, Anoop Shahar
• Prof. V. Kamraju, Hyderabad University
• Prof. Rakesh Saxena, SGSITS, Indore
• Prof. Aparajita Ojha, IIITDM, Jabalpur
• Prof Pritee Khanna, IIITDM, Jabalpur
• Prof. P.V. Jain, RDVV Jabalpur
• Prof. M. Dube, RDVV Jabalpur
• Prof. S. S. Rana, RDVV Jabalpur
• Prof. Puneet Tandon, IIITDM, Jabalpur
• Prof. Prashant Jain, IIITDM, Jabalpur
• Prof. S. C. Choubey, RGPV Bhopal
• Dr. Manoj Meshram, IITBHU
• Dr. A.K. Singh, IITBHU
• Dr. Biswajeet Mukharjee, IIITDM, JABALPUR
• Prof. Kanak Saxena, SATI Vidisha
• Prof. Laxmi Shrivastava , MITS, Gwalior
• Prof. N S Choudhary, UTU, Dehradun
• Prof. Jyoti Singhai, MANIT, Bhopal
• Prof. Nilay Khare, MANIT,Bhopal
• Prof. Savita Nema, MANIT,Bhopal
• Prof. Manisha Dubey, MANIT,Bhopal
• Prof. R.K Nema, MANIT,Bhopal
• Dr. P.J. Kulkarni, WCE, Sangli
• Dr. B F Momin, WCE, Sangli
• Prof. V.B. Dharmadhikari, WCE, Sangli
• Dr. Sumantra Dutta Roy, IIT, Delhi

3
Organising Committee
• Conference Chair
Prof. S. S. Thakur,
Principal, Jabalpur Engineering College, Jabalpur
• Program chair
Prof. Shailja Shukla, HOD , CSE Department ,JEC

• Organizing Secretary • Transportation Committee


Prof. A. K. Sharma Prof. A. K Jain
Prof. S. K. Shrivastava Prof. Nitin Saxena

• Coordinators • Media and Publicity Committee


Prof. R. Chandak Prof. U. K. Joshi
Prof. Prashant Jain Prof. Bhavana Singh
• Publication Committee • Hospitality Committee
Prof. L. S. Titare Prof. Shilpa Saxena
Prof. Mamta Lambart Prof. Manju Tiwari
• Technical Session • Audio and Video Committee
Prof. A.K Kori Prof. R.K Grover
Prof. Agya Mishra Prof. Sourabh Singh
• Finance Committee
Prof. Arun Pachori
Prof. R. K Yadav

• Registration Committee
Prof. Jyoti Bajpai
Prof. Mahima Thakur

• Accommodation Committee
Prof. M. P. Parsai
Prof. Ruchi Nigam

4
Preface
With the zest to boost Research and Development at international platform, FATER
Academy of India has organized 16th International Conference on “Engineering and
Mathematical Computational Intelligence”, 21st to 23rd December 2019 at Jabalpur
Engineering College, Jabalpur M.P, India. It gives me immense pleasure in writing this
message as an Editor of this proceeding. The FAI Conference Proceedings includes oral
presentations provided by enthusiastic students, practicing researchers, industry personalities
and academicians. The idea behind the publication of this conference proceeding was to help
and motivate researchers to carry forward their work to the next level.
I extend my warmest thanks to the authors for their interest, enthusiasm and timely
submission of full-length research papers and reviewers for their quick responses with valuable
suggestions to improve the articles. As Editor of FAI Vol2,2020, I anticipate that the
proceedings would be of immense value and will be definitely useful to researchers in their
practice or thinking process. This collection will also offer a window for new perspectives and
directions in the respective horizons. I hope that reading this proceeding will have an impact
on and encourage you to have an impact on others. We may never know how much our words
or action influence the lives of those around us. But we can choose daily to be a positive
influence on others in a way that could change the rest of their lives even if it is just within the
walls of where you work.

With Best wishes

Prof. Pankaj Srivastava,


General Secretary FAI,
Professor & Former Head, Department of Mathematics,
M.N. National Institute of Technology,
Prayagraj, India.

5
4 September, 2020
As an editor of this proceeding and the vice president of FATER Academy of India, we
are pleased to congratulate the successful presentation of many quality research papers at the
International Conference on Engineering, Mathematical and Computational Intelligence
(ICEMCI 2019), on December 21-23, 2019, held at Jabalpur Engineering College, Jabalpur,
Madhya Pradesh, India. The collaborating partners involve reputable FATER Academy of
India, Jabalpur Engineering College and Walchand Engineering College, and was sponsored
by TEQIP-III.
Clearly the multidisciplinary forum was successfully executed and delivered the golden
value of being multidisciplinary, especially involving mathematics, computation and
engineering. While mathematics serves as an important foundation and takes on a natural
complementary disciplinary role to support and drive the development of engineering and
computational sophistication, the engineering and computational professions apply
mathematics knowledge to develop ways to utilize, economically, the materials and forces of
nature for the benefit of mankind. Thus, together, they form the backbone of a nation’s
economy. This conference brought together eight important themes (mechanical and industrial
engineering, civil and environmental engineering, electrical and electronics engineering,
computer and information technology, pure and fuzzy mathematics, computational
mathematics, optimization techniques, and probabilistic and computation learning to meet the
21st century needs.
Through sharing and exchanging of knowledge and research-based discoveries, many
ideas were revealed to enable us to be more open-minded to other disciplines, whether of their
findings, methods, applications, and ways of thoughts.
Once again, congratulations to everyone participated in the conference, and with the
wholehearted gratitude to your dedication.
Thank you.

With warm regards,

Dr. Chai Ching Tan,


School of Management, Mae Fah Luang University

6
Table of Contents
No. Chapter Name Page
1 Design and Development of Soft computing Information system to assess
the impact of Spirituality on learning features 7-21

2 A Spectrum of Kidney Performance Intelligent System with reference to


stone formation related issues 22-31

3 Applications of Additive Manufacturing in Orthodontics


32-39

4 Investigating Behavior of Functionally Graded Sandwich Plates


40-47

5 CH Selection in WSN using Digital Image Processing


48-58

6 Sybil Attack in Vehicular Ad hoc Network (VANET) – A Survey


59-70

7 Mitigating Aspects of Disadvantages in Biodiesel Production


71-74

8 The effect of Design parameters on Fused Deposition Snap-Fit


components 75-80

9 Comparative Study of Edges of Thermal Images using Gradient,


Laplacian, Canny Operators 81-95

10 Scope of BIM Application forMunicipalSolid Waste Management


96-104

11 Optimization of Compound Casting through Simulation Software


105-112

12 A REVIEW ARTICLE OF LOW POWER CONSUMPTION


HETEROGENEOUS ROUTING PROTOCOL IN WSN 113-122

13 Achieving CIA using Hierarchical access control: a Review


123-135

14 A Review Identifying Effects of Minimum Quantity Lu-brication (MQL)


in Turning Process Using Conventional Fluids and Nano Fluids 136-144

15 Microgrid-A Future Energy Solution: Review


145-156

16 Experimental Analysis of 3D Printed Patterns and Conventional Pattern:


A Review 157-162

17 BRIEF REVIEW: VOLTAGE STABILITY AND POWER FLOW


ENHANCEMENT BY UPFC AND DPFC; AND COMPARISON OF 163-172
FACTS DEVICE
18 An informative analysis of Encryption algorithms using
quantitative Fitness Function 173-183

19 Multilayer Perceptron Using TFIDF for News Category Classification


184-195
Design and Development of Soft computing Information
system to assess the impact of Spirituality on learning
features

Pankaj Srivastava1 and Rajkrishna Mondal2

Department of Mathematics, Motilal Nehru National Institute of Technology,


Prayagraj, Uttar Pradesh 211004, India.

1drpankajsrivastava23@gmail.com
2rajkrishna@mnnit.ac.in

Abstract.In the present paper, we deal with the design and development of Soft
Computing base Information system to assess impact of Spiritual aspect on
Learning by using the concept of generating Linguistic Strings through non-
linear Fuzzy Membership Functions. The proposed system, on one hand, will
help in adopting a proper strategy to evaluate his present level of Spirituality
aspect on Learning and follow a balanced lifestyle. On the other hand, it will
provide a qualitative base detecting system to take a proper action. The pro-
posed information system is tested on real-life data with a satisfactory result as
per the various experts.

Keywords:Spirituality, Learning features, Intelligent systems, Soft computing.

1 Introduction

According to Hindu philosophy ,Spirituality is a divine quality and all humans


should aim to attain it. As per the definition concerned with the spirituality(1) and its
impact on leadership ,it has been observed that the role of spirituality in leadership is
a holistic approach to leadership and in which the leader strives to encourage a sense
of significance and interconnectedness among employees. Under the domain of Spir-
itual leadership, it involves the application of spiritual values and principles to the
workplace. The organizational leadership(2) understands the importance of employ-
ees finding meaning in their work and demonstrates a genuine concern for the
"whole" person, not just the employee. It has been found that a good number of or-
ganizations start functioning with the famous Gayatri Mantra and Mahamrityunjay
Mantra for a duration of fifteen miutes and close the activites of the day by practicis-
ing the meditation for the half an hour .The significance of practicising Gayatri and
Mahartunjay Mantras gives us the power to feel you and by this we feel happy, satis-
fied and peace in life. It is said to be a healing force that uplift people from the trap of
failure and rejuvenate them to think about the purpose of their life.

ISBN :978-81-945631-7-4

7
The Spritual leaders such as Gautama Buddha, Adi Shankaracarya,Swami Viveka-
nanda, Maharishi Mahesh Yogi, Neem Karauli Baba,Sadguru and many more , who
taught to millions of people such as business people and students ; the worldwide.
Facebook founder Mark Zuckerberg mentioned that he had visited a temple in India
during the initial days of Facebook on the advice of late Apple founder Steve Jobs,
according to an Economic Times report. “ Steve Jobs is said to have got the vision for
creating Apple after he visited the Kainchi Dham ashram.” Srivastava Pankaj and
coworkers(5,6,7,8,9,10,11,12) developed a good number Intelligent systems with the
help of Soft Computing tools to handle the issues concerned with real life problems.
In the present paper, we deal with the design and development of Soft Computing
based Information system to assess the impact of Spirituality on Learning features.

2 IMethods & Material

In this section we are interested to study that, how Spirituality effects on Learning
Mechanism? Using Soft Computing tools mainly Fuzzy Techniques, and our daily
life style (like. Meditation, Association with spiritual organization, intuition), envi-
ronmental factors (like Aura, Spiritual environments where the candidate stay, Family
Background), Age, Gender. We have made an attempt to capture that how the Spir-
ituality effects on our Learning mechanism. In order to develop the proposed system,
we consider Fuzzy sets, Membership functions namely Triangular membership func-
tion, Traphizoidal membership function, Gaussian membership function and Sig-
moidal Membership function as primary tools which are as follows:

0, 𝑥≤𝑎
𝑥−𝑎
, 𝑎≤𝑥≤𝑏
𝑏−𝑎
.𝑇𝑟𝑖𝑚𝑓(𝑥, [𝑎, 𝑏, 𝑐]) = 𝑐−𝑥
, 𝑏≤𝑥≤𝑐
𝑐−𝑏
{ 0, 𝑐≤𝑥

0, 𝑥≤𝑎
𝑥−𝑎
, 𝑎≤𝑥≤𝑏
𝑏−𝑎
𝑡𝑟𝑎𝑝𝑚𝑓(𝑥, [𝑎, 𝑏, 𝑐, 𝑑]) = 1, 𝑏≤𝑥≤𝑐
𝑑−𝑥
, 𝑐≤𝑥≤𝑑
𝑑−𝑐
{ 0, 𝑑≤𝑥
−(𝑥−𝑐)2
𝑔𝑎𝑢𝑠𝑠𝑚𝑓(𝑥, [𝜎, 𝑐]) = 𝑒 2𝜎2

1
𝑠𝑖𝑔𝑚𝑓(𝑥, [𝑎, 𝑐]) =
1+𝑒 −𝑎(𝑥−𝑐)

ISBN :978-81-945631-7-4

8
Fig. 1. Various kind of Fuzzy Membership Functions

2.1 Input Variables

According to Daily life style, Environmental Factors and Personal Information it clas-
sified as eight factors.

1. Daily Life Style:


o Meditation as part of routine activity (Input 1)
o Association with spiritual organization (Input 2)
o Intuition (Input 3)
2. Environmental Factors
o Aura (Input 4)
o Spiritual environments where the candidate stay (Input 5)
o Family Background (Input 6)
3. Personal Information
o Age (Input 7)
o Gender (Input 8)

2.2 Membership Functions of Input Variables

Meditation (Input 1)

Expected Range Membership Function


Fuzzy Sets
(hr./Day)
Little Effective (LE) <10 mints. sigmf(x, [-0.324, 12.94])
Slightly Effective (SE) 10-30 mints. gaussmf(x, [6.32, 21.75])
Very Effective (VE) 30-60 mints. gaussmf(x, [11.9, 58.97])
Very Very Effective (VVE) 1-2hrs. gaussmf(x [19.1, 100.5])
Extremely Effective (EE) > 2 hrs. sigmf(x, [0.193, 128.2]

ISBN :978-81-945631-7-4

9
Association with Spiritual Organization (Input 2)

Fuzzy Sets Expected Range Membership Function

Nothing (N) 0 0
Low (L) Yearly sigmf(x, [0.0702, 276.7])
Moderate (M) Monthly gaussmf(x, [49.34 189])
Active (A) Weekly gaussmf(x, [22.9 86.81])
Hyperactive (H) Daily sigmf(x, [-0.2616 20.7])

Intuition (Input 3)

Fuzzy Sets Expected Range Membership Function

Extremely (E) >80 sigmf(x, [0.2886, 80.38])


High (H) 30-80 gaussmf(x, [12.9, 51.85])
Moderate (M) 10-30 gaussmf(x, [8.54, 20.24])
Low (L) 1-10 sigmf(x, [-0.374, 10.51])
Nothing (N) 0 0

ISBN :978-81-945631-7-4

10
Aura (Input 4)

Expected Range Membership Function


Fuzzy Sets
(-10 to 10)
Extremely Positive (EP) >6 sigmf(x, [1.44, 6.389])
Positive (P) Between 3 to 6 gaussmf(x, [2.123, 5])
Average (A) Between -3 to 3 gaussmf(x, [2.123, 0])
Negative (N) Between -6 to -3 gaussmf(x, [2.123, -5])
Extremely Negative (EN) <-6 sigmf(x, [-1.44, -6.526])

Spiritual Environments (Input 5)

Expected Range Membership Function


Fuzzy Sets
(-100 to 100)
Very Low (VL) <-60 sigmf(x, [-0.144, -66.31])
Low (L) Between -60 to -20 gaussmf(x, [21.23, -50])
Normal (M) Between -20 to 20 gaussmf(x, [21.23, -4.44])
High (H) Between 20 to 60 gaussmf(x, [21.23, 50])
Very High (VH) >60 sigmf(x, [0.144, 63.36])

ISBN :978-81-945631-7-4

11
Family Background (Input 6)

Expected Range Membership Function


Fuzzy Sets
(0 to 100)
Low (L) <10 sigmf(x, [-0.371, 13.79])
Moderate (M) 10-30 gaussmf(x, [8.645, 21.7]
Active (A) 30-80 gaussmf(x, [14.93, 59.8]
Hyperactive (H) >80 sigmf(x, [0.216, 76.45])

Age (Input 7)

Expected Range Membership Function


Fuzzy Sets
(1 to 100)
Young (Y) 5-20 sigmf(x, [-0.291, 20.54])
Middle Aged (MA) 20-40 gaussmf(x, [10.51, 25.75])
Aged (A) 40-65 gaussmf(x, [10.51, 50.5])
Very Aged (VA) 65-85 gaussmf(x, [10.51, 75.25])
Old (O) Above 80 sigmf(x, [0.291, 81.34])

ISBN :978-81-945631-7-4

12
Gender (Input 8)

Expected Range Membership Function


Fuzzy Sets
(1 to 100)
Male (M) 1 f(x)=1, when x=1
Female (F) 2 f(x)=1, when x=2
Trans Gender (T) 3 f(x)=1, when x=3
Otherwise 0

2.3 Output Variables

─ Extremely High (EH)


─ High(H)
─ Average(A)
─ Low(L)
─ Extremely Low (EL)

ISBN :978-81-945631-7-4

13
2.4 Linguistic Strings

According to the various literature survey for each 8 input criteria taking the im-
portance between 1 to 8 where 8: most important and 1 most less important. Then
normalize this value between 0 to 1.

Input 1: 5, Input 2: 3, Input3:7, Input 4:4, Input 5:8, Input 6:6, Input 7:2, Input 8:1

So, the importance vector for these input variable will be: imp=[5, 3, 7, 4, 8, 6, 2, 1]

Now, the Sum of [5, 3, 7, 4, 8, 6, 2, 1]= 36,


So, after dividing 36 to each element of imp we get: [5, 3, 7, 4, 8, 6, 2, 1]/36=
=[0.1389 0.0833 0.1944 0.1111 0.2222 0.1667 0.0556 0.0278]

So, W= [0.1389 0.0833 0.1944 0.1111 0.2222 0.1667 0.0556 0.0278]

From Input Variables section it is seen that for 8 input variables there have 5, 5, 5, 5,
5, 4, 5, 3 corresponding membership functions. If we make the combinations of all the
input variables then we can make 5 ∗ 5 ∗ 5 ∗ 5 ∗ 5 ∗ 4 ∗ 5 ∗ 3 = 187500 no. of com-
bination.

Each combination of its is called the linguistic strings whose tabular form is given
below

Table 1. Linguistic Strings

String No. Input Input Input Input Input Input Input Input
1 2 3 4 5 6 7 8
𝑱𝟏 LE N E EP VL L Y M
𝑱𝟐 LE N E EP VL L Y F
⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮
𝑱𝟐𝟗𝟏𝟔 VE M M A M M A F
⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮
𝑱𝟏𝟖𝟕𝟒𝟗𝟗 EE H N EN VH H O F
𝑱𝟏𝟖𝟕𝟓𝟎𝟎 EE H N EN VH H O T

ISBN :978-81-945631-7-4

14
Table 2.Relation Matrix for 8 INPUT factors

Meditation (INPUT 1) Association (INPUT 2) Intuition (INPUT 3)


LE SE VE VVE EE N L M A H E H M L N
EH 1 2 3 4 5 1 2 3 4 5 5 4 3 2 1
H 2 3 3 3 4 2 2 3 3 4 4 4 3 2 2
A 3 4 2 3 4 3 3 3 3 3 3 3 3 3 3
L 4 4 2 2 3 4 4 3 2 2 2 2 3 4 4
EL 5 3 1 1 1 5 4 3 2 1 1 2 3 4 5
Aura (INPUT 4) Environments(INPUT5) Background (INPUT 6)

EP P A N EN VL L M H VH L M A H

EH 5 4 3 2 1 1 2 3 4 5 1 3 4 5
H 4 4 3 2 2 2 2 3 3 4 2 3 4 4
A 3 3 3 3 3 3 3 3 3 3 3 3 4 3
L 2 2 3 4 4 4 4 3 2 2 4 4 3 2
EL 1 2 3 4 5 5 4 3 2 1 5 4 3 1
Age (INPUT 7) Gender (INPUT 8)
Y MA A VA O M F T
EH 3 4 5 4 3 5 3 4
H 4 5 4 5 4 4 4 5
A 5 5 3 3 5 3 5 3
L 4 3 2 3 4 2 4 3
EL 3 2 1 2 3 1 3 2

2.5 Generating the Utility Matrix

Meditation Input 1 Input 2

Association

Input 3 Input 4
Intuition

Calculate the
Aura combination of each
START
Input 5 Input 6 relation matrix
Environment

Input 7 Input 8
Background Each row is multiplied by
W
Age
Rounding off and Normalize between 1 to 100

Gender
Generate Utility Matrix
Weighting
Value for
each Input
END
factors (W)

ISBN :978-81-945631-7-4

15
From the above graphical structure, it is shown that:
1. With the help of doctors and medical experts for each input variables according
to the importance criteria create weighting values W.
2. For each input variable, since there have various membership functions, therefore
for each input variables and corresponding to each membership functions we de-
veloped the relation matrix with the help of various literature survey.
3. According to the linguistic strings and with the help of W and Relation Ma-
trix(Shown in Table 2)create the utility data. Combining all the utility data we
create utility matrix.

Example: J1 = [LE, N, E, EP, VL, L, Y, M] for Extremely High(EH) output variable


From the relation matrix, its relation value is [1, 1, 5, 5, 1, 1, 3, 5]
After multiply to the relation value of J1 and W, we get
[0.1389 0.0833 0.1944 0.1111 0.2222 0.1667 0.0556 0.0278]*[1, 1, 5, 5,
1, 1, 3, 5]’=2.4444
Now if we consider all the linguistic strings 𝑱𝟏 to 𝑱𝟏𝟖𝟕𝟓𝟎𝟎 and multiply with W, min
value will be 1and max value will be 5.

If we map all the values between [1, 5] to [1,100] by using the linear function
(𝑥−5)/(5−1)=(𝑦−100)/(100−1)⇒𝑦=100+(99(𝑥−5))/4.

So, if we take x=2.4444 then y will be 36.7489 and after round off we get 37.
There the Utility value of 𝑱𝟏 for Normal output variable is 37. The details are shown
below.

Table 3.Utility Data of various output Factors corresponding to each linguistic string

OUTPUT Factors 𝐽1 𝐽2 𝐽3 ⋯ 𝐽2916 ⋯ 𝐽187498 𝐽187499 𝐽187500

EH 37 51 49 ⋯ 52 ⋯ 19 17 14
H 43 23 28 ⋯ 22 ⋯ 57 53 51
A 55 22 19 ⋯ 24 ⋯ 74 74 71
L 27 19 21 ⋯ 17 ⋯ 82 84 87
EL 19 15 29 ⋯ 25 ⋯ 79 81 76

ISBN :978-81-945631-7-4

16
2.6 Methodology

Showing the
Spiritual level of STOP
START the candidate

YES
User INPUT the
data for 8 Input
factors

Result is correct with discussion


through various experts NO
NO

All the Data is valid for


respective Input factors? Max between four OUTPUT
Update the Relation Matrix
Layers

Maximum Elements
YES

State of Calculate the Fuzzy Decision Calculate Optimum Fuzzy


the membership Values for each Making Utilities
Candidate Risk Factors

Calculate the Combination Calculate Maximizing Fuzzy Utility Matrix


Matrix Utilities (U)

Weighted Calculate Weighted Average Calculate Fuzzy Utilities


Matrix(W) from each column

From the above graphical structure, it is shown that


i. Taken the respective data for 8 input variables
ii. Generate the relational matrix and weighting values for each input variables
and with the help of that calculate utility data.
iii. According to the 8-input data of the candidate calculate the membership val-
ues for each input variables.
iv. With the help of membership and weighting values for each input variables
calculate the sates of the candidate.
v. Using the Utility values and state of the patient through our decision-making
algorithm compute the optimal alternative values for each output variables
vi. Finally, the maximum optimal alternative value will our final decision
vii. If our final decision is matched with expert’sdecisions then we stop our algo-
rithm unless we update the relation matrix and continue again these process-
es.

3 Experimental Results

N.B. The used data of these experiments are collected from the local candidate,
Prayagraj, India.

ISBN :978-81-945631-7-4

17
3.1 Experiment 1

The input variables:


Meditation = 30 mints/day, Association =Monthly, Intuition = Moderate,Aura = Posi-
tive, Spiritual Environments = Normal, Family Background = Moderate, Age= Aged,
Gender = Male.

Table 4. Fuzzy sets of the Input Variables (Experiment 1)

INPUT VARIABLES Corresponding Fuzzy Sets

𝐿𝐸 𝑆𝐸 𝑉𝐸 𝑉𝑉𝐸 𝐸𝐸
Meditation
. 1257 0.8542 0.7792 0.4983 0.0141

𝑁 𝐿 𝑀 𝐴 𝐻
Association
0.0630 0.6869 0.9350 0.5560 0.1419

𝐸 𝐻 𝑀 𝐿 𝑁
Intuition
0.0004 0.0222 0.8966 0.6325 0.0003

𝐸𝑃 𝑃 𝐴 𝑁 𝐸𝑁
Aura
0.1245 0.6892 0.4408 0.1702 0.0161

𝑉𝐿 𝐿 𝑀 𝐻 𝑉𝐻
Spiritual Environments 0.1018
0.1793 0.6596 0.9790 0.4018

𝐿 𝑀 𝐴 𝐻
Family Background
0.4110 0.8111 0.2356 0.1824

𝑌 𝑀A 𝐴 V𝐴 O
Age 0.1203
0.1067 0.4060 0.6394 0.4903

𝑀 𝐹 𝑇
Gender
1 0 0

Table 5.Fuzzy set of the state of the Candidate (Experiment 1)

i 1 2 3 ⋯ 2916 2917 2918 ⋯ 187498 187499 187500

𝜇(𝑗𝑖 ) 0.1039 0.1151 0.1735 ⋯ 0.1765 0.2217 0.2329 ⋯ 0.1105 0.1137 0.0422

ISBN :978-81-945631-7-4

18
Table 6.Calculation for Decision Making Algorithm (Experiment 1)

i 1 2 3 ⋯ 2916 2917 2918 ⋯ 187498 187499 187500


𝑈1 53 51 49 ⋯ 12 55 53 ⋯ 19 17 14
𝑓 ⋯ ⋯
𝑈1 0.1039 0.1151 0.1735 0.1765 0.2217 0.2329 0.1105 0.1137 0.0422
𝑓
𝑈1𝑚 0.5300 0.5100 0.4900 ⋯ 0.1200 0.5500 0.5300 ⋯ 0.1900 0.1700 0.1400
𝑓
𝑈1𝑜 0.1039 0.1151 0.1735 ⋯ 0.1200 0.2217 0.2329 ⋯ 0.1105 0.1137 0.0422

𝑈2 21 23 28 ⋯ 52 19 21 ⋯ 57 53 51
𝑓 ⋯ ⋯
𝑈2 0.1039 0.1151 0.1735 0.1765 0.2217 0.2329 0.1105 0.1137 0.0422
𝑓
𝑈2𝑚 0.2100 0.2300 0.2800 ⋯ 0.5200 0.1900 0.2100 ⋯ 0.5700 0.5300 0.5100
𝑓
𝑈2𝑜 0.1039 0.1151 0.1735 ⋯ 0.1765 0.1900 0.2100 ⋯ 0.1105 0.1137 0.0422

𝑈3 24 22 19 ⋯ 65 27 25 ⋯ 74 74 71
𝑓
𝑈3 0.1039 0.1151 0.1735 ⋯ 0.1765 0.2217 0.2329 ⋯ 0.1105 0.1137 0.0422
𝑓
𝑈3𝑚 0.2400 0.2200 0.1900 ⋯ 0.6500 0.2700 0.2500 ⋯ 0.7400 0.7400 0.7100
𝑓
𝑈3𝑜 0.1039 0.1151 0.1735 ⋯ 0.1765 0.2217 0.2329 ⋯ 0.1105 0.1137 0.0422

𝑈4 17 19 21 ⋯ 90 14 17 ⋯ 82 84 87
𝑓
𝑈4 0.1039 0.1151 0.1735 ⋯ 0.1765 0.2217 0.2329 ⋯ 0.1105 0.1137 0.0422
𝑓
𝑈4𝑚 0.1700 0.1900 0.2100 ⋯ 0.9000 0.1400 0.1700 ⋯ 0.8200 0.8400 0.8700
𝑓 ⋯ ⋯
𝑈4𝑜 0.1039 0.1151 0.1735 0.1765 0.1400 0.1700 0.1105 0.1137 0.0422

The decision making process yields an alternative optimal (𝐴𝑂 ) that provides various
phases of output:
𝑓
4. 𝐸𝑥𝑡𝑟𝑒𝑚𝑒𝑙𝑦 𝐻𝑖𝑔ℎ = 𝑀𝑎𝑥{𝑈1𝑂 } = 0.4019,
𝒇
5. 𝑯𝒊𝒈𝒉 = 𝑴𝒂𝒙{𝑼𝟐𝑶 } = 𝟎. 𝟔𝟕𝟕𝟐,
𝑓
6. 𝐴𝑣𝑒𝑟𝑎𝑔𝑒 = 𝑀𝑎𝑥{𝑈3𝑂 } = 0.6304,
𝑓
7. 𝐿𝑜𝑤 = 𝑀𝑎𝑥{𝑈4𝑂 } = 0.4513.
𝑓
8. E𝑥𝑡𝑟𝑒𝑚𝑒𝑙𝑦 𝐿𝑜𝑤 = 𝑀𝑎𝑥{𝑈5𝑂 } = 0.3013.

From the above decision layer, it is clearly indicated that Experiment 1 Candidate is
having a close possibility of Highly Spiritual.

ISBN :978-81-945631-7-4

19
3.2 Experiment 2

The input variables:


Meditation = 45 mints/day, Association =Weekly, Intuition = Extreme,Aura = Posi-
tive, Spiritual Environments = High, Family Background = Active,Age= Middle
Aged, Gender = Female.

Table 7.Fuzzy sets of the Input Variables (Experiment 2)

INPUT VARIABLES Corresponding Fuzzy Sets

𝐿𝐸 𝑆𝐸 𝑉𝐸 𝑉𝑉𝐸 𝐸𝐸
Meditation
. 1249 0.4531 0.8562 0.4793 0.0251
𝑁 𝐿 𝑀 𝐴 𝐻
Association
0.0330 0.5769 0.6450 0.8570 0.4419
𝐸 𝐻 𝑀 𝐿 𝑁
Intuition
0.9564 0.6542 0.4956 0.1225 0.0001
𝐸𝑃 𝑃 𝐴 𝑁 𝐸𝑁
Aura
0.4575 0.7892 0.4878 0.1502 0.0267
𝑉𝐿 𝐿 𝑀 𝐻 𝑉𝐻
Spiritual Environments 0.4034
0.1753 0.2796 0.4890 0.7028
𝐿 𝑀 𝐴 𝐻
Family Background
0.2810 0.6051 0.9856 0.7934
𝑌 𝑀A 𝐴 V𝐴 O
Age 0.1163
0.3087 0.8069 0.5684 0.2853
𝑀 𝐹 𝑇
Gender
0 1 0

Similarly, as Experiment 1 the decision-making process yields an alternative optimal


(𝐴𝑂 ) that provides various phases of output:
𝒇
9. 𝑬𝒙𝒕𝒓𝒆𝒎𝒆𝒍𝒚 𝑯𝒊𝒈𝒉 = 𝑴𝒂𝒙{𝑼𝟏𝑶 } = 𝟎. 𝟔𝟎𝟏𝟗,
𝑓
10. 𝐻𝑖𝑔ℎ = 𝑀𝑎𝑥{𝑈2𝑂 } = 0.5714,
𝑓
11. 𝐴𝑣𝑒𝑟𝑎𝑔𝑒 = 𝑀𝑎𝑥{𝑈3𝑂 } = 0.4394,
𝑓
12. 𝐿𝑜𝑤 = 𝑀𝑎𝑥{𝑈4𝑂 } = 0.2593.
𝑓
13. E𝑥𝑡𝑟𝑒𝑚𝑒𝑙𝑦 𝐿𝑜𝑤 = 𝑀𝑎𝑥{𝑈5𝑂 } = 0.1079.

From the above decision layer, it is clearly indicated that Experiment 2 Candidate is
having a close possibility of 𝑬𝒙𝒕𝒓𝒆𝒎𝒆𝒍𝒚 𝑯𝒊𝒈𝒉Spiritual.

ISBN :978-81-945631-7-4

20
4 Conclusion

The system designed, will help in adopting a proper strategy to evaluate the current
level of Spirituality aspect on learning features with a balanced lifestyle. On the other
hand, it will provide a qualitative base evaluating system to take a proper course of
action.

References

[1] Gallagher, Suzanne J., Tonette S. Rocco, and Hilary Landorf. "A phenomenological study
of spirituality and learning processes at work: Exploring the holistic theory of knowledge
and learning." Human Resource Development Quarterly 18, no. 4 (2007): 457-480.
[2] Tisdell, Elizabeth J. "Spirituality and adult learning." New directions for adult and contin-
uing education 2008, no. 119 (2008): 27-36.
[3] Miller, John P., SeliaKarsten, Diana Denton, Deborah Orr, and Isabella Colalillo Kates,
eds. Holistic learning and spirituality in education: Breaking new ground. SUNY Press,
2005.
[4] Buckler, Sheldon A., and Karen Anne Zien. "The spirituality of innovation: learning from
stories." Journal of Product Innovation Management: An international publication of the
product development & management association 13, no. 5 (1996): 391-405.
[5] Srivastava, Pankaj, and Neeraja Sharma. “Fuzzy Risk Assessment Information System for
Coronary Heart Disease." International Conference on Innovative Computingand commu-
nications Lecture Notes in Networks and Systems,2018,pp. 159-170,doi:10.1007/978-981-
13-2354-6 18.
[6] Srivastava, Pankaj, and Sharma, Neeraja. "A spectrum of soft computing model for medi-
cal diagnosis." Applied Mathematics & Information Sciences 8, no. 3 (2014): 1225.
[7] Srivastava, Pankaj, and Sharma, Neeraja "Soft computing criterion for ECG beat classifi-
cation and cardiac analysis." (2012).
[8] Srivastava, Pankaj, and Sharma, Neeraja and Singh, Richa. "Soft computing diagnostic
system for diabetes." International Journal of Computer Applications 47, no. 18 (2012).
[9] Srivastava, Pankaj, and Srivastava, Amit. "A note on soft computing approach for cardiac
analysis." Journal of Basic and Applied Scientific Research 2, no. 1 (2012): 376-385.
[10] Srivastava, Pankaj, and Srivastava, Amit. "Spectrum of soft computing risk assessment
scheme for hypertension." International Journal of Computer Applications 44, no. 17
(2012): 23-30.
[11] Srivastava, Pankaj, and Mondal, Rajkrishna. "Diabetes Diagnostic Intelligent Information
System." TEST engineering and management82, no.Jan/Feb (2020): 14455 – 14467.
[12] Srivastava, Pankaj and Srivastava, Saurabh “Soft Computing Market Research Analytics
on Recommendation for Tourists Destinations in Varanasi-India”, International Journal of
Advanced Science and Technology29, no.04(2020): 791-807.

ISBN :978-81-945631-7-4

21
A Spectrum of Kidney Performance Intelligent System
with reference to stone formation related issues

Pankaj Srivastava1[0000-0003-2437-4827]
Jyoti Srivastava2[0000-0003-4974-2438]
1Department of Mathematics, MNNIT Allahabad, Prayagraj-211004
drpankaj23@gmail.com

2Department of Mathematics, CMP Degree College, Prayagraj 211002


tsjyoti@gmail.com

Abstract. Kidney Stone is one of the vital health concerns for millions of peo-
ple across the world and especially in India. It is a problem that can come to any
person at any age.
Now days due to pollution, smoking, eating oily, fried and spicy junk foods,
toxin levels in our blood are increasing on the one hand and on the other hand,
breathing exercises are not followed. All these have resulted in reducing the ca-
pacity of lungs. And so, the burden on kidney is increasing. Moreover, the use
of refined oil, hydrogenated oil and consumption of certain drugs also directly
damage the kidneys.
In the present days one of the elements of Soft Computing i.e. fuzzy tools
are very effective in dealing with uncertain medical thoughts and are very close
to the way human thinks. In the present paper a system has been developed to
diagnose the kidney stones at a very early stage of its development and even
suggest what the tendency of the person to develop it is. Also, it will provide
the information if the condition is critical. This study is based on patient’s water
intake, Urinary tract infection, GFR, Blood pressure and family history. This in-
ference system will be applied on the real-life data collected from various med-
ical clinics to assess the performance of the system.

Keywords: Soft Computing, Kidney stones, Information System, Diagnostic

1 Introduction

Due to changing life style habits and changing dietary habits, the problem like kidney
stones is becoming very common ailment. Function of kidney is to clean waste from
the blood and remove it in the urine. They control the levels of sodium, potassium and
calcium in the blood.

If the intake of liquid is not sufficient, stones are formed in the kidney [1]. Excess of
acidic food often causes kidney stones. The formation of stones in the kidney is the

ISBN :978-81-945631-7-4

22
result of defects in the general metabolism [2]. They usually occur when the urine
becomes highly concentrated due to heavy perspiration.

Stones in the kidney do not show any symptoms and can go undiagnosed. When stone
leaves the kidney, it travels to the bladder through ureter. Often the stone become
lodged in this ureter and starts blocking the flow of urine [5].

The patient of kidney stones suffers from severe pain whenever these stones pass on
to bladder. Patient also feels nausea and vomiting. Patient feels the intense need to
urinate and also caught with high fever. Due to bruises and wounds in the urinary
tract by stones, bloods are seen in the urine and sever pain causes during urination.
The severe pain usually starts from side of the body, from back it radiates towards the
abdomen or towards lower part pelvis.

The kidney stones are compound of calcium oxalate and phosphorus. Calcium content
is largest in these stones.

Every year more than half a million people are diagnosed with kidney stones. As per
National Kidney foundation the risk of kidney stones in men is about 19% and in
women it is about 9% [11]. Other diseases such as high blood pressure, diabetes, and
obesity may increase the risk for kidney stones [6,7,8].

Treatment of kidney stones depends upon the type of stone, location of stone and how
severely it is affecting the urine passage. Sometimes medication is helpful and, in
some case, operations also suggested.

This article has been organized into 5 sections. In section 2, we developed the input
risk factors and decide the output variables. Section 3 has been discussed about the
methodology. In section 4, through the real medical data we have experimented our
method and verified it with medical experts. Also, a sensitivity analysis has been
made in this section. In section 5, we make a conclusion of this study.

2 Input Risk Factors and Output Variables

According to the above literature review [4,8,9,10] and through the consultation
with Doctors we have decided main five input risk factors which are directly or indi-
rectly effects the Kidney Stone formation.
1. Urine Frequency
2. Burning Sensation in Urine
3. Abdominal Pain
4. Fever
5. Water Intake
But in natural life the above taken inputs are not precise. So, though the quantitative
settings the measurement of these factors are not possible. In such scenarios qualita-

ISBN :978-81-945631-7-4

23
tive setting i.e., linguistics measurement tools are very important to remove such dif-
ficulty [3,4]. So, the above input factors have been classified in various linguistics
terms. The details have been shown in below table 1:

Table 1. Classifications of the Input factors

Input Factors Linguistic Classes Name


1) Urine Frequency a) Mild, b) Moderate, c) Severe

2) Burning Sensation in Urine a) Absent, b) Slightly High, c) Very High

3) Abdominal Pain a) no pain, b) Start from left or right and radiate


to interiorly, c) Start from left or right and radi-
ate to downwards.

4) Fever a)98.4-100; b)100-104

5) Water Intake a) Greater than 7 glass, b) Between 4 to 7 glass,


c) Less than 4 glass

According to Medical Experts the output levels has been classified into 5 level the
details are given below:
1. Level 1: No Risk
2. Level 2: High risk of Kidney Stone
3. Level 3: Stone presents in the upper part of Ureter
4. Level 4: Stone presents in the lower part of Ureter
5. Level 5: Stone lodges at the Ureter Vesical Junction

3 Methodology

This section has been organized into four phases.


In first Phase, through various literature survey, internet sources [12] and with the
help of medical experts we developed the relation matrices (𝑅𝑖 , 𝑖 = 1,2,3,4,5) for
each input risk factors.
In Second Phase, according to the importance of the input risk factors we devel-
oped the weighting vectors (𝑊).
In third Phase, developed the output vectors(𝑂) according to the patient input vari-
able.
In Final Phase, using 𝑂 and 𝑊 taking the final decisions.

ISBN :978-81-945631-7-4

24
3.1 Phase 1: Build Relation Matrix

Each relation matrix has been built through the rating system where 5 is fully satis-
fied, 4 is satisfied, 3 is for moderate, 2 is unsatisfied, 1 is for fully unsatisfied.

Table 2. Relation Matrix (𝑅1 ) of Urine Frequency vs Output Level


𝑹𝟏 a) Mild b) Moderate c) Severe
Level 1 5 2 1
Level 2 4 1 2
Level 3 1 4 3
Level 4 2 3 4
Level 5 3 5 5

Table 3. Relation Matrix (𝑅2 ) of Burning Sensation in Urine vs Output Level

𝑹𝟐 a) Absent b) Slightly High c) Very High


Level 1 5 4 1
Level 2 4 5 2
Level 3 3 3 5
Level 4 2 2 4
Level 5 1 1 3

Table 4. Relation Matrix (𝑅3 )Abdominal Pain vs Output Level

𝑹𝟑 a) No Pain b) Interiorly c) Downwards


Level 1 5 1 1
Level 2 4 2 2
Level 3 3 5 4
Level 4 2 4 5
Level 5 1 3 3

Table 5. Relation Matrix (𝑅4 )Fever vs Output Level

𝑹𝟒 a) 98.4-100 (in oF) b) 100-104 (in oF)


Level 1 5 1
Level 2 4 2
Level 3 3 4
Level 4 2 3
Level 5 1 5

ISBN :978-81-945631-7-4

25
Table 6. Relation Matrix (𝑅5 )Water intake vs Output Level

𝑹𝟓 a) > 9 glass b) 4-9 glass c) < 4 glass


Level 1 5 4 5
Level 2 4 5 4
Level 3 3 3 5
Level 4 2 2 4
Level 5 1 1 3

3.2 Phase 2: Generating Weighting vectors(W)

According to various literature survey and using the knowledge of Medical Experts
we have generated the Weighting Vectors for the input variables. As previous phase
we have taking the rating system between 1 to 5 for marking the importance of the in-
put variables. Where 5 stands for most important and 1 for less important. Input risk
factors and the corresponding importance value has been shown below:
1. Urine Frequency: 5
2. Burning Sensation in Urine: 2
3. Abdominal Pain: 5
4. Fever: 1
5. Water Intake: 4
So, the generating weighting vector is 𝑊 = [5 2 5 1 4]

3.3 Phase 3: Computing the Output Vector (𝑶𝒖𝒕𝒑𝒖𝒕)

In this phase 1st taken the input from the patient:


Let the input for five risk factors is 𝐼𝑃 = [𝐼𝑃(1), 𝐼𝑃(2), 𝐼𝑃(3), 𝐼𝑃(4), 𝐼𝑃(5)]

Now the output variable has been computed through the following equations

𝑂𝑃(𝑖) = 𝐼𝑛𝑑𝑒𝑥[𝑀𝑎𝑥{𝑅𝑖 (: , 𝐼𝑃(𝑖))}], 𝑖 = 1,2,3,4,5

Output vector will be 𝑂𝑢𝑡𝑝𝑢𝑡 = [𝑂𝑃(1), 𝑂𝑃(2), 𝑂𝑃(3), 𝑂𝑃(4), 𝑂𝑃(5)]

3.4 Phase 4: Final Decision using W and O


For taken the final decisions 1 st we multiply W and 𝑂𝑢𝑡𝑝𝑢𝑡 vector component wise
i.e. 𝑀 = 𝑊 ∗ 𝑂𝑢𝑡𝑝𝑢𝑡 = [5 ∗ 𝑂𝑃(1), 2 ∗ 𝑂𝑃(2), 5 ∗ 𝑂𝑃(3), 1 ∗ 𝑂𝑃(4), 4 ∗ 𝑂𝑃(5)]

After that we have calculated the indexing of the maximum value of 𝑀 which is
𝑖𝑛𝑑 = 𝐼𝑛𝑑𝑒𝑥[𝑀𝑎𝑥{𝑀}]
Now the final decisions will be taken according the value of 𝑜𝑢𝑡𝑝𝑢𝑡(𝑖𝑛𝑑)

ISBN :978-81-945631-7-4

26
The MATLAB Code and Flow diagram (in figure 1.) for the above methods has been
shown below

R1 = [5 2 1;4 1 2;1 4 3;2 3 4;3 5 5];


R2 = [5 4 1;4 5 2;3 3 5;2 2 4;1 1 3];
R3 = [5 1 1;4 2 2;3 5 4;2 4 5;1 3 3];
R4 = [5 1;4 2;3 4;2 3;1 5];
R5 =[5 4 5;4 5 4;3 3 5;2 2 4;1 1 3];

IP= input ('enter the values of each risk factors');


W= [5 2 5 1 4];
[~,OP(1)]=max(R1(:,IP(1)));
[~,OP(2)]=max(R2(:,IP(2)));
[~,OP(3)]=max(R3(:,IP(3)));
[~,OP(4)]=max(R4(:,IP(4)));
[~,OP(5)]=max(R5(:,IP(5)));
Output=OP;
M=W.*Output;
[~,ind]=max(M);
Final_result=Output(ind)

Phase 2
Phase 1 (Build Relation Matrix) (Generating Weighting vector )

W
R1 R2 R3 R4 R5

Phase 3 Phase 4
(Computing the Output Vector ) (Final Decision)

RELATION MATRIX OUTPUT M

FINAL OUTPUT
INPUT

Fig. 1. Flow Diagram of the Intelligent System

ISBN :978-81-945631-7-4

27
4 Experiment with Sensitivity Analysis

4.1 Experiment

From near Health Center we have collected a patient data for our five input risk fac-
tors. The details are given below

1. Urine Frequency: 1 i.e. (a) Mild


2. Burning Sensation in Urine: 2 i.e. (b) Slightly High
3. Abdominal Pain: 2 i.e. (b) Start from left or right and radiate to interi-
orly
4. Fever: 1 i.e. (a) 98.4oF- 100oF
5. Water Intake: 2 i.e. (b) Between 4 to 7 glasses Daily

So, in this case IP= [1 2 2 1 2] and Output= [1 2 3 1 2]

Therefore, M= [5 4 15 1 8] and 𝑖𝑛𝑑 = 𝐼𝑛𝑑𝑒𝑥[𝑀𝑎𝑥{𝑀}] = 3


So, the final result will be 𝑂𝑢𝑡𝑝𝑢𝑡(3) = 3
In such case we can decide that the patient is in Level 3

4.2 Sensitivity Analysis

In this section we have discussed the sensitivity of the input variables. If the changes
happen in input variables then how it effects into the output variables.

Fig. 2. Output variables of Urine Frequency vs Burning Sensation in Urine.

ISBN :978-81-945631-7-4

28
Fig. 3. Output variables of “Burning Sensation in Urine vs Abdominal Pain” and “Ab-
dominal Pain vs Fever”

Fig. 4. Output variables of “Fever vs Water Intake” and “Urine Frequency vs Water Intake

From the figure 2, 3 and 4 it is cleared that how the output variables react when we
change the input variables.

If it makes a combination vectors of all the input variables and after that if we plot
the output variables then this picture has been shown in figure 5.

ISBN :978-81-945631-7-4

29
Fig. 5. Output variables of all kinds input variables

Our Diagnosis: As per our result the person lies in level 3 it means that the pa-
tient is having stone in the upper part of the ureter.

Doctor’s Diagnosis: As per report of patient the stone is 8.6 mm and doctor
says that when the pain appears in the patient the stone was lying in the upper part of
the ureter. After medication the pain subsided and stone was gradually removed.

Thus our diagnosis matches with that of doctor’s diagnosis and on the same line
no. of cases has been tested to check the authenticity of the system.

5 Conclusion

In this paper we have developed an algorithm to diagnose the presence and location of
kidney stone using the fuzzy model. In the current research we have collected the data
of the patients based on our input factors and result of this diagnosis have been vali-
dated with the help of expert doctors. The advantage of this research is that it can help
any person to check if he is having the risk of kidney stone or if he is suffering from
this problem in this way the present research model can act as a first line of diagnosis.

Acknowledgement

The Authors would like to extend our gratitude to Dr. Shailesh Dwivedi, M.D. (Medi-
cine) for giving us our precious time for evaluating the performance of our system
and guiding all the way with his valuable suggestions to develop this research article.
We would also like to thank Dwivedi Multispecialty Hospital for providing us with
the data of the patients without which our research would be incomplete.

ISBN :978-81-945631-7-4

30
References
1. Al-Risi, Aaisha Obaid Zayid, N. Ali, and A. Ahuja. "Study on prevalence and management
of renal stones among Omani in-patients at Sohar hospital." Sch. J. App. Med. Sci 2.1A
(2014): 22-33.
2. Levey, Andrew S., et al. "Definition and classification of chronic kidney disease: a posi-
tion statement from Kidney Disease: Improving Global Outcomes (KDIGO)." Kidney in-
ternational 67.6 (2005): 2089-2100.
3. Bellman, Richard E., and Lotfi Asker Zadeh. "Decision-making in a fuzzy environment."
Management science 17.4 (1970): B-141.
4. Begum, Shahin Ara, and O. Mema Devi. "Fuzzy algorithms for pattern recognition in med-
ical diagnosis." Assam University Journal of Science and Technology 7.2 (2011): 1-12.
5. Mahdavi-Mazdeh, Mitra. "Why do we need chronic kidney disease screening and which
way to go?." Iranian journal of kidney diseases 4.4 (2010): 275.
6. Srivastava, Pankaj, and Amit Srivastava. "A note on soft computing approach for cardiac
analysis." Journal of Basic and Applied Scientific Research 2.1 (2012): 376-385.
7. Srivastava, Pankaj, Neeraja Sharma, and Richa Singh. "Soft computing diagnostic system
for diabetes." International Journal of Computer Applications 47.18 (2012).
8. Srivastava, Pankaj, and Amit Srivastava. "Spectrum of soft computing risk assessment
scheme for hypertension." International Journal of Computer Applications 44.17 (2012):
23-30.
9. Srivastava, Pankaj, Amit Srivastava, and Ritu Sirohi. "Soft computing tools and classifica-
tion criterion for hepatitis B." International Journal of Research and Reviews in Soft & In-
telligent Computing 2.2 (2012): 147-153.
10. Srivastava, Pankaj, and Neeraja Sharma. "A spectrum of soft computing model for medical
diagnosis." Applied Mathematics & Information Sciences 8.3 (2014): 1225.
11. Goeddeke-Merickel, Catherine M. "Kidney Stone Disease: Online and Educational Re-
sources." Nutritional and Medical Management of Kidney Stones. Humana, Cham, 2019.
291-294.
12. Kidney Stones: A Patient Guide https://www.kidney.org/atoz/content/kidneystones

ISBN :978-81-945631-7-4

31
Applications of Additive Manufacturing in Orthodontics

Akash A. Joshi1 and Kedar H. Inamdar2


1PG Student, Department of Mechanical Engineering (M Tech Production)
2 Professor, Department of Mechanical Engineering,

Walchand College of Engineering,


Sangli- 416415, India.

1akash.joshi697@gmail.com
2kedar.inamdar@walchandsangli.ac.in

Abstract: Additive manufacturing has gain importance in the manufacturing


industry recently. It plays an extensive role in the field of dentistry. Digital files
in the STL format are fed to a 3D printer to make three-dimensional solid
objects. The treatment procedures become easy, time-saving, cost-effective
when using additive manufacturing, unlike conventional manufacturing
techniques. Instead of using conventional brackets, we can use transparent
aligners for minor tooth movement. Nowadays, people are very much conscious
about the aesthetics related to teeth. Due to the 3d printing process, there is
anincredible change in the market regarding orthodontic treatment. A clear
aligner is the transparent, removable and comfortable retainer that are used for
tooth positioning. A clear aligner system is having an advantage in changing the
initial position of the teeth. 3D printing process and the virtual models of teeth
add a new tool in the field of the orthodontic market. This is the combination of
the medical and engineering field in which the research is going on day by day.
This article shows trends and up- dates of additive manufacturing in
orthodontics as well as the manufacturing of 3D printed models and
thermoformed clear aligners for tooth positioning.

Keywords: Thermoplastic material, fused deposition modelling, clear aligner, 3D


printing.

1 Introduction

Dentistry is one of the oldest technologies in the medical profession. Over


some years, a huge revolution has occurred in this field. 3D printing is additive
process in which layer by layer formation of models is occurred. While comparing
with the traditional methods, the subtraction method is used for manufacturing the
same. CAD-CAM software is used to generate the virtual models. The modifications
can be done easily with the help of software. 3D scanning and modeling is done for
changing the tooth positioning of models.
Invisalign had introduced by Align technology in 1998 in the orthodontic
market which is used to fabricate the aligner for the minor tooth movement by
creating the digital 3d printed models. People are very much conscious about the
aesthetics related to teeth. The demand for aligners has increased drastically due to the
smaller, transparent and easy to use the type of aligners. The rmo plastical igners are
popular because of the transparency, comfortable and light in weight.

ISBN :978-81-945631-7-4

32
Research is going on day by day in the field of the orthodontic aligner
treatment to make alternative over conventional brackets. The main aim of the
orthodontic treatment is to maintain the tooth alignment. Digital STL files are scanned
by using 3d scanners and 3d models are manufactured by using FDM technology. The
modifications can be done by using CAD software and modified files can be used to
print with the help of additive manufacturing processes.

2 Literature Review

T. Wheeler et al. [1] Work on tooth movement and, in particular, tooth movement
dynamics with aligners and variations in these movements has been studied in order to
further improve the computer algorithms used in the sequence of aligned tooth
movements.
L. Yu Chan et al. [2] suggested that in-office 3D printing would enable orthodontics
to print physical models that could be used to build alignments. Digital FDM 3D
printer prototypes will minimize costs and boost the quality of service delivery by
outsourcing. We will save extra time to print at holidays. In addition, orthodontists
can change the tooth movement settings as much as they like on digital models, as it is
not costly to create a physical model. A lot of people with orthodontics are worried
with esthetics.
K. Mahn Kim et al. [3] as well as poor presentation, oral health is impaired during
orthodontic treatment. Transparent orthodontic aligners (TOAs) are introduced as an
alternative to fixed brackets and wires to tackle this problem. TOAs can be quickly
added and removed and do not impair a person's ability to chew. These are most
widely used in adult orthodontic care.
C. Groth et al. [4] Studied that 3D printing is still widespread in orthodontic practice,
we expect it to follow a path close to that of intraoral electronic scanners. By using a
3D printer, the orthodontist will achieve a fully digital workflow. The removal of
conventional impressions and stone models not only reduces clutter and storage
requirements in the hospital but also improves functional performance, improves the
health of appliances, facilitates model reuse, leads to happier patients and personnel.
Tarika M A Kohil [5] Studied all processes of 3D printing related to dentistry and
advantage of processes are to be studied in this paper. The future scope is explained
well. The improvements in technology should be carried out for the tooth alignment
and positioning.

3 Fused Deposition Modelling


Fused deposition modeling is the process of manufacturing in which three
dimensional models are manufactured layer by layer process. The additive processes
are SLA, SLS, and POLYJET, etc. which are also used for printing 3D models. In
FDM printer PLA, PVA, ABS, etc. materials are used for preparing 3D models. This
process is cheaper compared to others. By using the FDM process, we can produce the
3D physical models of the tooth and these models are used to fabricate thermoplastic
aligners.

ISBN :978-81-945631-7-4

33
This process reduces cost and gives better service to the patients. Figure1 shows the
real printing of model on 3Dprinter.

Fig. 1 Printing of Dental Model by using FDM Technology.

3.1 Material for 3DPrinting.


PLA material is used for manufacturing the 3d printed models.
Table 1 Material Properties.
Material PLA

Nozzle Temp °C 190-220


Bed Temp °C 30-50
Properties Stiff and brittle, biocompatible
Use prototypes, low stress applications

3.2 3D Scanner Specifications.


The scanner specifications are given below.
Table 2 Scanner Specifications
Scan mode Fixed scan with turntable
Single shot accuracy 0.05 mm
Scan speed Single scan < 2s
Point distance 0.16 mm
Loading capacity 5 kg
Single scan range 210 ×150 mm
Light source White light LED
Data format OBJ, STL, ASC, PLY

ISBN :978-81-945631-7-4

34
3.3 Advantages of 3DPrinting
• Customization– Any type of complex material can be printed.
• Constant Prototyping and Improved Productivity– Both large- and small-
scale models can be easily get printed.
• Affordability– The initial cost is high compared with traditional one but
labor and material cost is low in 3Dprinting.
• Time saving-Manufacturing 3D models the time required is less compared to
traditional methods.
• Accuracy- It is the main output of the 3d printing process in dentistry.
• Complexity- The possibility of printing complex geometries can be easily
done and the assembly of parts is not required.
• Less material is required and waste material can be re used.
• Production of single objects, smaller quantities at low cost is possible and de-
livery is becoming very fast.

3.4 Disadvantages

• Small size–Some printer shave small size but in the future, we would
fabricate the large size printer.
• Small raw materials
• High cost of investment.
• Lot of skills are required.
• Further post process is required.

3.5 Applications
• Mass customization- Companies have developed platforms where users can use
streamlined web-based configuration tools to customize objects and order the
resulting objects as unique 3Dprinted objects.
• Food industry- Additive food processing is produced by pressing food into
three-dimensional objects, layer by layer. Suitable candidates include a wide
range of foods, such as chocolate and chips, and flat foods such as crackers,
pasta and pizza.
• Bioprinting-3D printing is known to be a method for the implantation of
stem cells capable of producing new tissues and organs in living humans.
Stem cells make an enormous promise in 3D bio printing that they can
convert into every other kind of cell in the human body.

ISBN :978-81-945631-7-4

35
• Dentistry-3Dmodelsarepreparedbyusingtheprinteranddigitalmodelscan be
changed with respect to the required shape and size.
• Aerospace industry- To check the aerodynamic capacity of planes, the 3d
models are prepared and tested in the labs.
• Space – Small 3d models for educational purposes are to be manufactured by
using the additive manufacturing process.

4 Orthodontics

Orthodontics is a dental discipline devoted to the treatment, prevention, and


rehabilitation of malposition teeth and jaws. It may also concentrate on improving
development of the head, known as orthopedic den to facial. Abnormal teeth and jaws
alignment is wide spread, almost 30 percent of the population has sufficiently serious
malocclusions to benefit from orthodontic therapy.
Individual medical implants and appliances are a demand for the manufacture
of additives. The printing of human tissue is one of the key promises of additive
manufacturing. Organizations have been successfully printing bones that have
survived and thrived in animals for many years. Computers are used computed
tomography (CT) or magnetic resonance imaging (MRI) to image and model the
shape and size of the body component. This data is used to drive an AM computer that
prints absorbable materials such as hydroxyapatite into a porous scaffold structure.
Living cells are printed within the porous scaffold structure, ideally taken from the
patient. Some soft tissue has been made, such as that for a bladder. The ultimate goal
is to produce full organs like kidneys and hearts. For medical implants, the 3D printed
models are prepared by using additive manufacturing. There is a number of different
processes in additive manufacturing such as SLA, SLS, FDM, POLYJET, etc. To
make the models at affordable cost, the fused deposition modeling process is used.
Figure 2 shows the actual printing of the dental model.

Fig. 2 3D Printed Dental Model.

ISBN :978-81-945631-7-4

36
4.1 Steps of Aligner Manufacturing by using the rmo forming Process.
• Aligners are the 3d shaped transparent bracket which is used to move teeth to
the predefined position.
• It is transparent and easy to use for patients.
• Instead of using the traditional brackets, then ew technology has introduced
in the field of dentistry.
• PETG and copy plast materials are used to manufacture clear aligners.
• First, the 3d scanning of the patient is done then the modification has made in
the digital file.
• The digital file is converted in STL format and Gcodes are to be generated by
using CURA software.
• G code file is used to form the 3d model.
• 3d models are manufactured by using FDM 3d printer.
• Circular sheet of PETG material is heated and thermoforming process is
carried out by using Bio-star thermoforming machine. Figure 3 shows the
thermoformed clear aligners.
• The post-process is carried out on a clear aligner.

Fig. 3 Thermoformed Aligner.


5 Comparison of Traditional Orthodontics and Digital Orthodontics
Table 3 Comparison between Traditional Ortho dontics and Digital
Orthodontics
Traditional Orthodontics Digital Orthodontics

1. Older industrial science. 1. New industrial science.

2. Weaker in strength. 2. Higher strength.

3. Complex shapes are difficult to 3. It is easy to produce


produce. complex shapes.
4. Modification cannot be done. 4. Easy to modify.

5. Lower quality and no good 5. Higher quality and good


appearance. appearance.

ISBN :978-81-945631-7-4

37
Fig. 4 Traditional Orthodontics (3D Fig.5 Digital Orthodontics (3D Models
Models Made by Clay Material). Made by PLA Material).

6 Conclusion

Digital orthodontics plays a vital role in the orthodontic market. The quality
improvement appearance, aesthetics are the major advantages of this process. The
fused deposition modeling is the process of 3d printing which is less expensive, easy
to use. Material cost is lower and it has greater efficiency. It requires less time; no
chemical and physical post-processes are required. CAD-CAM software and 3D
printing is the best engineering tool which has more applications in the dentistry. The
initial cost is high and the training is required for production. The transparent aligner
has gained the instant appeal to patients so, the treatment of clear aligner is popular
than traditional methods of orthodontics. Research in the improvement of technology
is going on so, the scope of orthodontics will be more in the future.

7 Acknowledgement

The authors acknowledge the supports provided by Walchand College of engineering


Sangli. The authors would also like to thank the support of the Bharti Vidyapeeth
hospital and medical college, Sangli.

References
1. T.Wheeler,“ Orthodontic clear aligner treatment”, Orthodontic clear aligner treatment,
Seminars in Orthodontics, 2016.
2. L. Chan, C. Chen Jane Yao and Y. Jane Chen, “Clear Aligner Treatment with In-Office
Virtual Model Set-Up and 3D Printing”, Journal of Dentistry and Oral Care, 21-25,2017.
3. K. Mahn Kim, “Effects of therm of ormingon the physical and mechanical properties of
thermoplastic materials for transparent orthodontic aligners”, Korean Journal of
Orthodontics, 317-325,2018.

ISBN :978-81-945631-7-4

38
4. C. Groth, N. Kravitz, P. Jones and J. Graham, “Three-Dimensional Printing Technology”
48, 475-485,2014.
5. T. Kohil, “3D Printing in Dentistry” ACTA Scientific Dental Sciences, 35-41,2019.
6. J. Stansbury and M. Idacavage, “3D printing with polymers: Challenges among expanding
options and opportunities” Dental Materials 32, 54-64,2016.
7. E.Taneva, B. Kusnotoand C.Evans,“3D Scanning, Imaging, and Printing in Orthodontics”
149-187,2016.
8. Aligner, www.youtube.com, https://www.youtube.com/watch?v=kAQJB6vhzz0, August
21,2019.
9. S. Mahamood, M. Kader and H. Ali, “Applications of 3D Printing in Orthodontics: A Re-
view” 267-270,2016.
10. K. Lee, J. Cho, N. Chang, J. Chae, K. Kang, S.Kim and J. Cho, “Accuracy of three
dimensional printing for manufacturing replica teeth” Korean Journal of Orthodontics,217-
225, 2015.

ISBN :978-81-945631-7-4

39
Investigating Behavior of Functionally Graded Sandwich
Plates - A Review

Venushree S. Khanke1 and S. N.Tande2


1 Research Scholar, Walchand College of Engineering, Sangli, Maharashtra
2 Professor, Walchand College of Engineering, Sangli, Maharashtra

venushree.khanke@walchandsangli.ac.in,
hod.apm@walchandsangli.ac.in

Abstract. The modern materials in the composites family are the Functionally
Graded Materials (FGMs). Some natural FGMs are wood, human skin and
bones,bamboo, etc. Functionally Graded Materials havevivid applications in
engineering structures, aircraft and spacecraft, navy and medical fields by virtue
of its great advantages. Metal/Ceramic FGM composites are mostly used in
which the ceramic layer offers better heatresistance whereas metal layer offers
great fracture toughness. Uniform and gradient variation in the materialcharac-
teristics aid in reducing the stresses at the interface and delamination ofstruc-
tures. The capability to tailor the properties of advanced composites - Function-
ally Graded Materials as per the problem demand is the reason behind the sig-
nificant attention of theresearch community. Now-a-days, Functionally Graded
sandwich plates and beams are widely used in many applications. Therefore,
this study deals with the review of the methods proposed by various research
experts for evaluating theperformance of sandwich plates made of FGM. Dif-
ferent methods and theories of plate namelyCPT,FOSDT, HOSDT, Layer wise
Theory and Zigzag Theory along with their merits and demerits are put forth in
this study.

Keywords: Functionally Graded Materials, LayerWise Theory, Zig-ZagTheory.

1 Introduction

The modern engineered composites are the Functionally Graded Materials (FGMs).
Some natural Functionally Graded Materialsare wood, human skin and
bones,bamboo,etc. [1]. Firstly, FGMs were manufactured in Japan during 1980s tak-
ing into consideration the enormous benefits of these materials[2]. The prevalent ones
are Metal-Ceramic FGMs in which excellent fracture toughness is exhibited by metal
and great thermal resistance is exhibited by ceramics. These FGMs enhance the
characteristics of thermal barrier structures due to the smooth transition between the
characteristics of the parts, ultimately preventing cracking or delamination[3].
The stresses at interface and delamination of structure can be removed with uni-
form and gradient alterations in the material characteristics of functionally graded
material builtstructures. Metal-ceramic FGM's interface results in few deformation of

ISBN :978-81-945631-7-4

40
elevated temperature gradient in some instances. For instance, a nuclear reactor in
which there is continuous fission reactions. Common structures made of functionally
graded materialsare made of ceramic and metal layers called as sandwich functionally
graded plates. These plates consist of face sheets of uniform material andcentral core
of functionally graded material. These laminates are useful in prevention of distor-
tions and failure. The ability to adapt according to the operating conditions is the main
point of focus in Functionally Graded Materials (FGMs) which ultimately aids in
design and manufacturing of these materials depending on the functional require-
ments[4].
The research community's recent focus on composites and functionally graded
sandwich plates is solely due to their capacity to design the characteristics according
to the requirements of the problem. Different techniques and theories of plate pro-
posed by many researchers are discussed here for analyzing functionally graded
sandwich plates.

2 Literature Survey

Various theories of composite plates namely Classical Plate Theory (CPT), First Or-
der Shear Deformation Theory (FOSDT), Higher Order Shear Deformation Theory
(HOSDT) and Layer Wise Theory (LWT) etc. are presented by multiple researchers
toevaluate the performance of Functionally Graded plates.

Fig.1.Deformation of transverse normal as per various theories.

ISBN :978-81-945631-7-4

41
2.1 Classical Plate Theory (CPT)

CPT is so called Kirchhoff’s Plate Theory. The basic presumption made is that the
plate thickness remains same during bending as there are zero transverse shear
strains[5]. The normal stress is considered as null in the direction of thickness which
converts 3D problem into a 2D one. The Fig.1.clearly explains the concept of Classi-
cal Plate Theory. Yang &Shen[6]studied non-uniform performance of functionally
graded plates by semi-analytical approach. Loads were applied in transverse and in-
plane directions on the plates to study large deflection as well as post buckling re-
sponse. The displacement field is given by:

𝜕𝑤
𝑢(𝑥, 𝑦, 𝑧, 𝑡) = 𝑢0 (𝑥, 𝑦, 𝑡) − 𝑧
𝜕𝑥
𝜕𝑤
𝑣(𝑥, 𝑦, 𝑧, 𝑡) = 𝑣0 (𝑥, 𝑦, 𝑡) − 𝑧
𝜕𝑦
𝑤(𝑥, 𝑦, 𝑧, 𝑡) = 𝑤0 (𝑥, 𝑦, 𝑡)(1)

where𝑢0 , 𝑣0 𝑎𝑛𝑑𝑤0 are the central plane displacements along the correspondingX, Y
and Zco-ordinate system.Malekzadeh&Beni[7] has applied CPT for analyzing FG
plates made of non-homogeneous materials. Different boundary conditions were ap-
plied to the plates for studying nonlinear free vibrations. Alinia&Ghanadpour[8] has
used CPT for the non-uniform performance of square FG plates loaded with pressure.
Deflections and stresses were found by minimizing the potential energy.But the main
drawback of this theory is that it is applicable for thin plates only and not suitable for
composite plates.

2.2 First Order Shear Deformation Theory (FOSDT)

FOSDT is also called as Timoshenko Beam Theory. The main presumption ofFOSDT
is that shear strain in transverse direction remains constant throughout the plate thick-
ness. This leads to requirement of shear correction factor for appropriate deformed
strain energy representation. The Fig.1. clearly explains the abstract idea of First Or-
der Shear Deformation Theory. Belalia&Houmat[9] proposed Mindlin’s FOSDT for
the study and developed new concept of finite element method by using a curved p-
element of triangular shape. Threedifferent forms of sector plates consisting function-
ally graded materials (Stainless Steel/Silicon Nitride, Aluminium/Aluminium Oxide,
Aluminium/Zirconium Oxide) were used for nonlinear free vibrations. The in-plane
displacements (u0,v0) and out-plane displacement (w0) were expressed as:

𝑢(𝑥, 𝑦, 𝑧, 𝑡) = 𝑢0 (𝑥, 𝑦, 𝑡) + 𝑧 𝜃𝑦 (𝑥, 𝑦, 𝑡)


𝑣(𝑥, 𝑦, 𝑧, 𝑡) = 𝑣0 (𝑥, 𝑦, 𝑡) + 𝑧 𝜃𝑥 (𝑥, 𝑦, 𝑡)
𝑤(𝑥, 𝑦, 𝑧, 𝑡) = 𝑤0 (𝑥, 𝑦, 𝑡)(2)

where𝜃𝑥 represents the corresponding normal rotation in the perpendicular direction


about the Yaxis and 𝜃𝑦 represents the corresponding normal rotation in the perpendicu-

ISBN :978-81-945631-7-4

42
lar direction about the Xaxis axes.Kiani, et al.[10] used FOSDT for performance of
sandwich plates made of FGtop and bottom face sheets subjected to Pasternak elastic
foundation. This study focused on its thermal and mechanical buckling behavior.
Vimal, et al.[11]proposed FOSDT on moderately thick FG plates to study the shear
deformation effects in transverse direction and rotary inertia. Yin, et al. [12] applied
isogeometric analysis approach for analyzing functionally graded plates with geomet-
ric imperfections. FOSDT considering the presumptions given by von-Karman was
put forth by Wu &Kitipornchai[13]to obtain the non-uniform vibration behavior of
geometrically imperfect functionally graded composite beams reinforced with carbon
nanotubes. However, this theory is not applicable for thick plates and there arises a
need for shear correction factor which led to further research and evolution of-
HOSDT.

2.3 Higher Order Shear Deformation Theory (HOSDT)

As there are shortcomings in CPT and FOSDT, Higher Order or Refined ShearDe-
formation Theories were developed. The in plane displacement fields consists of
higher order polynomials which are function of thickness co-ordinate. This eliminates
the requirement of factor of shear correction unlike in FOSDT[14]. The Fig.1.clearly
explains the concept of HOSDT. Yang, et al.[15]proposed HOSDT to find out the
post buckling performance of geometrically imperfect FG plates. 1-D quadrature
semi-analytical method was applied to determine the dominating differential equa-
tions. Talha& Singh [16]studied the steady state and free vibrationalperformance of
functionally graded plates. The above and base face sheets in the plate were subjected
to traction free boundary conditions. Jagtap, et al.[17]proposed a HOSDT comprised
of non-uniform strains proposed by von Karman and C0 continuity with some modifi-
cations. Probabilistic non-uniform free vibration behavior of FGplateresting on elastic
supports and subjected to randomness of thermal system was studied. Gupta
&Talha[18] presented a new higher order shear and normal deformation theory con-
sidering non-polynomial displacement function which investigated the vibrational
performance of FGM plates with geometric non linearity. Tomar&Talha[19] proposed
Reddy’s HOSDT for studying the static bending and vibrationalperformance of FGM
skew sandwich plates under thermal conditions. The displacement field as per Red-
dy’s HOSDT was assumed as:

𝑢 𝑢0 ∅𝑥 𝜓𝑥 𝜉𝑥
{ 𝑣 } = { 𝑣0 } + 𝑧 {∅𝑦 } + 𝑧 2 {𝜓𝑦 } + 𝑧 3 {𝜉𝑦 }(3)
𝑤 𝑤0 0 0 0

where u, v, andw are the translational deflections at a point in in-plane and transverse
directions, u0,v0,w0 are central plane displacements. ∅𝑦 refers to transverse normal
rotation to the central plane about Y axis and ∅𝑥 refers to transverse normal rotation to
the central plane about X axis, 𝜓𝑥 , 𝜓𝑦 , 𝜉𝑥 , 𝜉𝑦 are terms of higher order in Taylor’s
series expansion. This theory does not represent the exact behavior of the laminated
composite plates as there exist discontinuity of strains at layer interfaces.

ISBN :978-81-945631-7-4

43
2.4 Layer-Wise Theory (LWT)

There is discontinuity in transverse strains at the boundary of the layers which is not
addressed by CPT, FOSDT or HOSDT, so Layer-wise Theories were devel-
oped.Layer-wise Theory considers displacement field, Stress and Strain fields at each
layer interface throughout the thickness. This results in continuous transverse stress at
the interfaces which helps in accurate analysis. Yas, et al. [20]analyzed FGM hollow
cylindershaving piezoelectric ring by using Layer-wise theory. Virtual Work concept
wasappliedalong with the incorporation of discontinuities in the formulation at
the interface for obtaining governingdifferential equations. Pan-
dey&Pradyumna[21]studied the performance of sandwich plates made up of FGMs
by a higher order Layer wise theory. It was presumed that the core displacement field
is of higher order and upper and lowerface sheets displacement fields of first order
which ensures continuity in layer interface displacements. The central plane dis-
placements 𝑢(𝑖𝑖) ,𝑣 (𝑖𝑖) and 𝑤 (𝑖𝑖) along X, Y and Z directionsrespectively, given in thick-
ness coordinate 𝑧 (𝑖𝑖) form by Taylor's expansion are as follows:

𝑢(𝑖𝑖) (𝑋, 𝑌, 𝑍, ) = 𝑢0 (𝑋, 𝑌) + 𝑧 (𝑖𝑖) 𝜃𝑥 (𝑖𝑖) + 𝐿1


𝑣 (𝑖𝑖) (𝑋, 𝑌, 𝑍, ) = 𝑣0 (𝑋, 𝑌) + 𝑧 (𝑖𝑖) 𝜃𝑦 (𝑖𝑖) + 𝐿2
𝑧 (𝑖𝑖) (𝑋, 𝑌, 𝑍, ) = 𝑧(𝑋, 𝑌)(4)

where𝑢0 , 𝑣0 and𝑤0 represent thecentral plane displacements corresponding to X, Y


and Z co-ordinate system. The terms 𝜃𝑥 (𝑛) represent the rotation of the central plane
which is perpendicular corresponding to nth layer about Yaxis &𝜃𝑦 (𝑛) represent the
rotation of the central plane which is perpendicular corresponding to nth layer about X
axis, respectively (n =1, 2, 3). L1and L2 are expressed as

2 3
𝐿1 = (𝑧 (𝑖𝑖) ) 𝑢∗ + (𝑧 (𝑖𝑖) ) 𝜃𝑥 ∗
2 3
𝐿2 = (𝑧 (𝑖𝑖) ) 𝑣 ∗ + (𝑧 (𝑖𝑖) ) 𝜃𝑦 ∗ (5)

𝑢∗ , 𝑣 ∗ , 𝜃𝑥 ∗ and 𝜃𝑦 ∗ are terms of higher order in Taylor's expansion series which indi-
cates deformation modes in the cross section of the mid layer in transverse direction.
Even though LWT helps in accurate analysis; a great computational effort is required
as the layers in the laminated plate go on increasing.

2.5 Zig-Zag Theory (ZZT)


Layer-wise Theories provides excellent response so as to obtain displacements and
stresses in in-plane and transverse directions but there is great computational draw-
back. The degrees of freedom (dofs) are directly related to the number of plate layers.
Hence, high calculations are required as the number of plate layers increase. This can
be overcomed by considering dofs that are not determined depending on the number
of plate layers as in case of Zig-Zag Theories which are special sub-class of Layer-
wise Theories. The basic assumption in this theory is that the in-plane displacements

ISBN :978-81-945631-7-4

44
are Zig- Zag functions. Carrera [22]published a review paper on application of zigzag
function developments. Brischetto, et al.[23]has used Zig-Zagfunction proposed by
Murakami for studying bending response of sandwich plates. Neves, et al.
[24]proposed hyperbolic theory for to evaluate theperformance of sandwich plates of
FGM. This theory takes into account various effects such as zigzag and warping.
More research is required to develop Zig-Zag theory for accurate results.

Table 1. Summary of the theories

Theory Presumptions & Advantages Disadvantages


CPT i. Transverse normal which is straight i. It is applicable to thin plates only.
and at right angles to the central- ii. Shear strains in the transversedi-
plane before deformation remains the rection are presumed to be zero.
same after deformation. iii. Under-prediction of deflections
ii. Simplest equivalent single layer theo- and over-prediction of natural
ry. frequencies and buckling loads.
iii. 3-D problem is reduced to a 2-D iv. It is not sufficient for studying the
problem. behavior of composite plates.

FOSDT i. Transverse normal which is straight i. Shear stresses in the transverse


and at right angles to the central- direction are uniform for the en-
plane before deformation remains tire thickness.
straight but not at right angles to the ii. There exists a need for shear cor-
deformed central-plane. rection factor.
ii. It anticipates the behavior of thin iii. It is inapplicable for thick plates.
plates precisely.
iii. It is a simple theory with less calcula-
tion involved.
HOSDT i. Transverse normal which is straight i. It is a 2-D approximate theory.
and perpendicular to the central-plane ii. Theories greater than third order
beforedeformation neither remains requires algebraic complications
neither straight nor perpendicular to and lot of computational efforts.
the deformed central-plane. iii. It does not predict the exact be-
ii. It eliminates the need for shear cor- havior of laminated composite
rection factor. plates i.e., transverse shear stress
iii. It yields accurate deflections, vibra- may be continuous at layer inter-
tion frequencies etc. in thick plates. face while corresponding strain
may be discontinuous.

LWT i. The displacement is continuous for i. As the layers in the plate go on


the entire thickness of plate. increasing, the unknownsincrease.
ii. The in-plane displacements differ in ii. The computations are very costly.
a layer wise way.
iii. Stresses in the transverse direction
are constant at interfaces of layer.
ZZT i. The displacements in in-plane i. There exists a need of C1 continu-

ISBN :978-81-945631-7-4

45
directiondiffer in a piece-wise pat- ity of the transverse displacement.
tern throughout the thickness of plate.
ii. The analysis is highly efficient.

3 Concluding remarks

The above study of literature reveals that extensive research work is performed by
multiple researchers for attaining the desired performance of Functionally Graded
Plates. Differenttheoriesofplates such as CPT, FOSDT, HOSDT, LWT, ZZT
and various methods were applied to assess the flexural and vibrational performance
of functionally graded plates. The researchers have used FOSDT and HOSDT exten-
sively for the analysis, however there are some demerits associated with them as they
are two dimensional analogous single layer theories. It is observed that the advanced
Layer wise and Zig-Zag plate theories are advantageous so as to understand the actual
performance of such plates with good computational accuracy. Therefore, further
research is required to improve the LWT and ZZT for obtaining the static flexure and
vibrational performance of FG sandwich plates. The improvement in LWT and ZZT
will be carried out for the desired performance of FG plates.

References
1. D. K. Jha, T. Kant, and R. K. Singh, “A critical review of recent research on
functionally graded plates,” Compos. Struct., vol. 96, pp. 833–849, (2013).
2. M. Koizumi, “FGM activities in Japan,” Compos. Part B Eng., vol. 28, no. 1–2, pp. 1–
4, (1997).
3. S. S. Wang, “Fracture Mechanics for Delamination Problems in Composite Materials,”
J. Compos. Mater., vol. 17, no. 3, pp. 210–223, (1983).
4. B. Abdenbi, E. B. Khalid, and B. Rhali, “Geometrically Non-Linear Free Vibration
Analysis of Functionally Graded Rectangular Plates,” vol. 7, no. 11, pp. 1242–1246,
(2013).
5. A. Gupta and M. Talha, “Recent development in modeling and analysis of functionally
graded materials and structures,” Prog. Aerosp. Sci., vol. 79, pp. 1–14, (2015).
6. J. Yanga and H. S. Shen, “Non-linear analysis of functionally graded plates under
transverse and in-plane loads,” Int. J. Non. Linear. Mech., vol. 38, no. 4, pp. 467–482,
(2003).
7. P. Malekzadeh and A. Alibeygi Beni, “Nonlinear free vibration of in-plane
functionally graded rectangular plates,” Mech. Adv. Mater. Struct., vol. 22, no. 8, pp.
633–640, (2015).
8. M. M. Alinia and S. A. M. Ghannadpour, “Nonlinear analysis of pressure loaded FGM
plates,” Compos. Struct., vol. 88, no. 3, pp. 354–359, (2009).
9. S. A. Belalia and A. Houmat, “Nonlinear free vibration of functionally graded shear
deformable sector plates by a curved triangular p-element,” Eur. J. Mech. A/Solids,
vol. 35, pp. 1–9, (2012).
10. Y. Kiani, E. Bagherizadeh, and M. R. Eslami, “Thermal and mechanical buckling of

ISBN :978-81-945631-7-4

46
sandwich plates with FGM face sheets resting on the Pasternak elastic foundation,”
Proc. Inst. Mech. Eng. Part C J. Mech. Eng. Sci., vol. 226, no. 1, pp. 32–41, (2012).
11. J. Vimal, R. K. Srivastava, A. D. Bhatt, and A. K. Sharma, “Free vibration analysis of
moderately thick functionally graded skew plates,” Eng. Solid Mech., vol. 2, no. 3, pp.
229–238, (2014).
12. S. Yin, T. Yu, T. Q. Bui, and M. N. Nguyen, “Geometrically nonlinear analysis of
functionally graded plates using isogeometric analysis,” Eng. Comput. (Swansea,
Wales), vol. 32, no. 2, pp. 519–558, (2015).
13. H. L. Wu, J. Yang, and S. Kitipornchai, “Nonlinear vibration of functionally graded
carbon nanotube-reinforced composite beams with geometric imperfections,” Compos.
Part B Eng., vol. 90, pp. 86–96, (2016).
14. S. Parida and S. C. Mohanty, “Vibration and Stability Analysis of Functionally Graded
Skew Plate Using Higher Order Shear Deformation Theory,” Int. J. Appl. Comput.
Math., vol. 4, no. 1, pp. 1–22, (2018).
15. J. Yang, K. M. Liew, and S. Kitipornchai, “Imperfection sensitivity of the post-
buckling behavior of higher-order shear deformable functionally graded plates,” Int. J.
Solids Struct., vol. 43, no. 17, pp. 5247–5266, (2006).
16. M. Talha and B. N. Singh, “Static response and free vibration analysis of FGM plates
using higher order shear deformation theory,” Appl. Math. Model., vol. 34, no. 12, pp.
3991–4011, (2010).
17. K. R. Jagtap, A. Lal, and B. N. Singh, “Stochastic nonlinear free vibration analysis of
elastically supported functionally graded materials plate with system randomness in
thermal environment,” Compos. Struct., vol. 93, no. 12, pp. 3185–3199, (2011).
18. A. Gupta and M. Talha, “An assessment of a non-polynomial based higher order shear
and normal deformation theory for vibration response of gradient plates with initial
geometric imperfections,” Compos. Part B Eng., vol. 107, pp. 141–161, (2016).
19. S. S. Tomar and M. Talha, “On the flexural and vibration behavior of imperfection
sensitive higher order functionally graded material skew sandwich plates in thermal
environment,” Proc. Inst. Mech. Eng. Part C J. Mech. Eng. Sci., vol. 233, no. 4, pp.
1271–1288, (2019).
20. M. H. Yas, M. Shakeri, and M. Khanjani, “Layer-wise finite-element analysis of a
functionally graded hollow thick cylinder with a piezoelectric ring,” Proc. Inst. Mech.
Eng. Part C J. Mech. Eng. Sci., vol. 225, no. 5, pp. 1045–1060, (2011).
21. S. Pandey and S. Pradyumna, “Analysis of functionally graded sandwich plates using a
higher-order layerwise theory,” Compos. Part B Eng., vol. 153, no. August, pp. 325–
336, (2018).
22. E. Carrera, “Historical review of Zig-Zag theories for multilayered plates and shells,”
Appl. Mech. Rev., vol. 56, no. 3, pp. 287–308, (2003).
23. S. Brischetto, E. Carrera, and L. Demasi, “Improved bending analysis of sandwich
plates using a zig-zag function,” Compos. Struct., vol. 89, no. 3, pp. 408–415, (2009).
24. A. M. A. Neves, D. De Engenharia, F. De Engenharia, U. Porto, and R. R. Frias,
“Analysis of functionally graded structures by radial basis functions using several
theories under Carrera ’ s Unified Formulation,” vol. 19, p. 10129, (2006).

ISBN :978-81-945631-7-4

47
CH Selection in WSN using Digital Image Processing

Jyotesh Pateriya1 [0000-1111-2222-3333], Shriya Sinha2 [1111-2222-3333-4444] and M. P. Parsai3 [2222-3333-4444-5555]


1 Jabalpur Engineering College, Jabalpur, Madhya Pradesh, India
2 Jabalpur Engineering College, Jabalpur, Madhya Pradesh, India
3 Jabalpur Engineering College, Jabalpur, Madhya Pradesh, India

lncs@springer.com

Abstract. Wireless Sensor Network is a Wireless Network involves spatially


devices utilizing sensors to observe Physical and Natural conditions. WSN is
worked from a few hubs to many. Hub is linked to a number of Sensing Devic-
es whenever required. The Integration of WSN may be used in several purpos-
es. LBSO is used for balancing the Hubs. It enhances the number of early death
Hubs, less life time, and high packet loss. Due to less life time power failure
may be happened. This protocol does not provide proper load balancing, so that
the network may be inefficient. This paper targeted many factors of the WSN,
such as CH selection, lower data size without applying compression and in-
creased network life time. The technique is mainly based on Digital Image Pro-
cessing.

Keywords: LBSO, WSN, CH, LoC.

1 Introduction

A rising class of WSNs applications includes obtaining a lot of physical information


from battery controlled, low calculation and low memory Wireless Sensor hubs. The
propagation method between hubs may be Routing or flooding. In
Telecommunications, WSNs is a dynamic study with various workshops and
conference given every year that is the reason we have chosen this topic.

The primary application is to monitor the distant locations then gather the information
concerning surprising phenomenon such as Fire in Forest, Volcano eruption & Enemy
association. Utilizing ARQ to handle mistaken parcels in such condition is wasteful,
as a result of more re-transmissions are required. WSNs contain spatially isolated self-
governing Sensing Devices to observe physical or natural conditions such as Thermal,
Acoustic and Strain etc. and to considerately send the information throughout ar-
rangement toward the Base Station. Military Survey was completed to see how the
hardware and the innovations can be applied to serve the military needs. The Survey
verified that WSN's can be successfully utilized in the military borders to monitor any
movement crosswise over it. Various necessities of Armed Surveillance structure

ISBN :978-81-945631-7-4

48
were considered. Because of the arbitrary distribution of Hubs from the air vehicle,
the Hubs get scattered; for example more Hubs will fall in one region while less Hubs
in various other area. The density of Hubs won't be same all through. Consequently,
hundred percentage coverage of the territory may be impossible [9].

Fig.1. Line of Control between two Countries [9].

2 Wireless Sensor Networks

Wireless-Sensor-Networks give power to innovative choice of application together


with farming, smart house, observe & track automobiles, patients and plants, Tele-
monitoring of Physiological statistics etc. [7]. The special nature of WSNs, mainly the
limited energy source in addition to low computation and memory capabilities, made
traditional routing algorithms like IP/TCP unsuitable for WSNs. This motivated
researcher to design routing algorithms that fit the needs and nature of WSNs. Some
basic examples of WSNs applications are military, where sensor hubs are utilized to
recognize enemy development, traffic control, where sensor hubs gather information
about vehicle jams, health sector to observe patient's condition, and a lot more [5].

Fig.2. Wireless Sensor Networks (a) JNKVV, (b) Water Treatment Plant Jabalpur [15]

A sensor Hub consists, in general, of a sensing unit, a processing unit, a transceiv-


er, and a power unit. Its mission might be described by three key terms: Detection,
Computation and Transmission. There is a range of sensor hubs [8], for example:
i. Acoustic Sensors
ii. Thermal Sensors
iii. Magnetic Sensors

ISBN :978-81-945631-7-4

49
iv. Mechanical Sensors
v. Bio Sensors

2.1 Life Time

Life time is characterized by the time between First Hub Death (FND) and Last Hub
Death (LND). Life Time is the key feature meant for evaluate system in an function
specific manner [4].

2.2 Dissipation

Energy Dissipation implies the absolute Energy dissipated in System to carry out
communication, collection & accumulation [4].

3 Literature Work

Mohamed Elshrkawey, Samiha M. Elsherif and M. Elsayed Wahed et al [4, 2017]


presented a helpful approach to upgrade the Routing in the LEACH Protocol for
WSN. Two methods have been proposed:
i. First is to select accurate CH by modifying Election Threshold.
ii. The subsequent technique has focused to avoid hubs, that send a larger number
of Packets than other hubs in the whole system.

Maurizka Ainur Rahmadhani et al [2, 2018] presented LEACH-WSNoverDTN in


a busy network. They proposed low delivery delay and buffer capacity. The network
size or simulation area was kept 100m * 100m with taking 60, 80, 100, 200, 300 or
400 Hubs. Initial energy level 1 Joule and the packet size 100 Byte has been taken.
This protocol has the problem of early death Hubs. It has higher energy Dissipation
about 0.03 to 0.15 more than that of LEACH-WSN [2].

Md. Saiful Islam Rubel et al [3, 2018] Clustering is the procedure to facilitate ex-
tremely well towards attains level up as well as energy reduction. They planned Clus-
tering method so as to able to handle crucial & delay perceptive purpose. [3].

Let,
CS= Total number of Critical Sensor
If CS > 0 then it means there are some Critical Sensors. Now these Sensors cannot be
present elected CH.
In the rest of the Hubs, the Hub having minimum energy level is selected as CH.

The network size or simulation area was kept 100m * 100m with taking 100 Hubs.
Initial energy level 0.15 Joule and the packet size 400 Byte has been taken. Simula-
tion has been done in MATLAB. The proposed protocol is (Distance Based Energy
Aware) DBEA-LEACH. The Transmission / Receiving Energy are 50 Joule. Hub is

ISBN :978-81-945631-7-4

50
selected as CH if its distance from Sink is nearly equal to the average distance of the
network Hubs from Sink as well as that Hub has high Residual Energy. The result of
the method id improved Life Time [3].

Gajendran Malshetty and Basavaraj Mathapati et al [1, 2019] These Systems made
by many Sensing Hubs. This type of Sensing Hub gathers information. With the pur-
pose of accumulate huge quantity of information, Cloud Services are also used. This
assists to store information. Load Based Self-Organized (LBSO) is used for balancing
the Hub. There are 3 stages:

CH Selection.
First find out the Trigger Hub. Then calculate the Cluster Radius. The Hub having
highest Load (Weight) is selected as CH.

Cluster Formation.
Now Cluster size has to be defined. Hubs send the request for cluster formation, and
then size of the cluster be match up with the Threshold size. Accordingly, Clusters
will be formed. Each of the members obeys CI Table, which contains the following
information:
i. Cluster Head Hub (CHN) - ID
ii. Sensor Hub (SND) - ID

CH Re-selection.
Reselection process is repeated now. CH holds the Consignment of each of the mem-
ber Hubs; highest is selected as next CH. It means Hub having highest Consignment
is selected as CH [1].

4 Proposed Work

First Objects are stored in the form X-Y Coordinates as .txt file. Identify the total
number of Objects. Scan again after every 30 or 60 seconds. Store in the form X-Y
Coordinates of Objects again as .txt file. Now compare both the files.

ISBN :978-81-945631-7-4

51
Fig.3. Test Image-1 captured by Thermal Sensor of a Hub.

Case I
Both the files have similar data. It means all the Objects are stationary. There is no
any Object is suspected. Thermal Cameras send the lower spaced data means lower
Packet data by applying Steganography to enhance the security [10].

Fig.4. Extraction of X-Y Coordinates from Test Image-1 using MATLAB.

Table 1. Comparative Analysis in Case I.


X-Y Coordinates A.txt B.txt Result.txt
1X 1.464402e+02 1.464402e+02 1.464402e+02
1Y 1.407865e+02 1.407865e+02 1.407865e+02

ISBN :978-81-945631-7-4

52
2X 5.211828e+02 5.211828e+02 5.211828e+02
2Y 2.107138e+02 2.107138e+02 2.107138e+02
3X 7.998132e+02 7.998132e+02 7.998132e+02
3Y 2.252407e+02 2.252407e+02 2.252407e+02

Fig.5. sending data by Steganography in MATLAB editor.

Case II
Both the files have dissimilar data. It means any of the Objects is movable. There may
be an Object suspected. In this situation, Thermal Camera turns ON the Alarm or
Image Camera. Now this Hub sends the larger Image data means larger Packet data.

ISBN :978-81-945631-7-4

53
Fig.6. Extraction of X-Y Coordinates from Test Image-2 using MATLAB.

Table 2. Comparative Analysis in Case II.


X-Y Coordinates A.txt B.txt Result.txt
1X 1.464402e+02 2.116367e+02 NaN
1Y 1.407865e+02 1.282602e+02 NaN
2X 5.211828e+02 6.411027e+02 NaN
2Y 2.107138e+02 2.105577e+02 NaN
3X 7.998132e+02 9.001139e+02 NaN
3Y 2.252407e+02 2.183791e+02 NaN

4.1 Life Time

Moment while earliest Hub is dead and that’s why failure in the coverage takes place
is LT [4, 7].
Let,
𝐸0 = opening energy = 10 J [14]
𝐸[𝐸𝑤 ] = Expected-wasted-energy
(unused energy of network after the death of Hub)
= 10% of 𝐸0 = 1 J [12, pn-63]
𝐸[𝐸𝑟 ] = Expected Reporting Energy of the network consumed
by each of the sensors [13]
= 150 mW for Image Sensor
= 0.5 mW – 5 mW for Temperature Sensor
Note- 1 Joule/Sec = 1 Watt
Now the average Life Time is given by [11]:
E [L] = S.𝐸0 – E[Ew] ……………………………………… (1)
E[Er]

ISBN :978-81-945631-7-4

54
The simulation has been executed in many Hubs ( 25 to 225 ) to verify the energy
Dissipation is reduced with respect to the size [7 pp.161].

Case I: For Image Sensor

If S = Total number of Hubs in the network = 25


E[L] = 25. 10J – 1J
150 mJ/Sec
E[L] = 1660 Sec ……………………………………… (2)

If S = quantity of the Sensing Hub = 49


E[L] = 49. 10J – 1J
150 mJ/Sec
E[L] = 3260 Sec ……………………………………… (3)

If S = quantity of the Sensing Hub = 100


E[L] = 100. 10J – 1J
150 mJ/Sec
E[L] = 6660 Sec ……………………………………… (4)

If S = quantity of the Sensing Hub = 144


E[L] = 144. 10J – 1J
150 mJ/Sec
E[L] = 9594 Sec ……………………………………… (5)

If S = quantity of the Sensing Hub = 225


E[L] = 225. 10J – 1J
150 mJ/Sec
E[L] = 14994 Sec ……………………………………… (6)

Case II: For Temperature Sensor

If S = quantity of the Sensing Hub = 25


E[L] = 25. 10J – 1J
0.5 mJ/Sec
E[L] = 498000 Sec ……………………………………… (7)

If S = quantity of the Sensing Hub = 49


E[L] = 49. 10J – 1J
0.5 mJ/Sec
E[L] = 978000 Sec ……………………………………… (8)

ISBN :978-81-945631-7-4

55
If S = quantity of the Sensing Hub = 100
E[L] = 100. 10J – 1J
0.5 mJ/Sec
E[L] = 1980000 Sec ……………………………………… (9)

If S = quantity of the Sensing Hub = 144


E[L] = 144. 10J – 1J
0.5 mJ/Sec
E[L] = 2878000 Sec ……………………………………… (10)

If S = quantity of the Sensing Hub = 225


E[L] = 225. 10J – 1J
0.5 mJ/Sec
E[L] = 4498000 Sec ……………………………………… (11)

Fig.7. Comparison in various sizes of Networks using MATLAB.

If any of the Hubs detects the doubtful object, then the processor send the infor-
mation to the CH. Only in this case the Images are transmitted while all other Hubs
are sending Thermal Image data. All the Image cameras are in idle mode. It means
Hubs send a little amount of information to the network. Therefore the Congestion
problem is reduced. It prohibited the time delay in the transmission of the data and
helps to increase the Life Time.

ISBN :978-81-945631-7-4

56
5 Conclusions

The downsides of LEACH could be described into three fundamental issues. The
main issue manages the incorrect decision of the CH. The 2nd issue incited by the
load unbalancing of sensor hubs in each of the clusters. Dissipation of the sensing
hubs in small size Cluster is greater compared with the bigger size Cluster. Since hubs
of small size Cluster send the majority of information. 3rd issue have formalized in
steady state stage. The entire hubs are persistently transferred. The transfer is carrying
out regardless of whether update is nothing for detected information. It address to the
purpose behind dropping inefficient energy Dissipation. This dropping causes de-
crease of the LT [4]. In this paper, we have surveyed the existing algorithms present-
ed in the literature. We have proposed a new algorithm that aims towards minimizing
Power Dissipation, and provide the better CH selection method.

Gajendran Malshetty and Basavaraj Mathapati et al find out the Residual Energy of
all the Hubs. They also say that the Hub having highest Load (Weight) is selected as
CH [1]. The result will be early death Hubs. It provides less life time, so that power
failure may be happened. On the other hand the proposed methodology says that the
Hub having highest Load (Weight) should not be selected as CH. It is not a right
choice. The proposed method provides the following 2 conclusions:
i. Case I provides less time delay due to lower data size in the form of X-Y Coor-
dinates.
ii. Case II provides highest Load (Weight). Therefore it is not a right choice to se-
lect this Hub as CH, because it increases the risk of early death Hubs. The other
Hubs which has greater Residual Energy and has a lower Load (Weight) should
be selected as CH.

References
1. Gajendran Malshetty and Basavaraj Mathapati: Efficient clustering in WSN-Cloud us-
ing LBSO (Load Based Self-Organized) technique. Third International Conference on
Trends in Electronics and Informatics (ICOEI 2019).
2. Maurizka Ainur Rahmadhani, Leanna Vidya Yovita and Ratna Mayasari: Energy Con-
sumption and Packet Loss Analysis of LEACH Routing Protocol on WSN over DTN.
IEEE (2018).
3. Md. Saiful Islam Rubel, Nahi Kandil and Nadir Hakem: Priority Management with
Clustering Approach in Wireless Sensor Network (WSN). IEEE (2018).
4. Mohamed Elshrkawey, Samiha M. Elsherif and M. Elsayed Wahed: An Enhancement
Approach for Reducing the Energy Consumption in Wireless Sensor Networks. Journal
of King Saud University – Computer and Information Sciences (2017).
5. Tri Gia Nguyen, Chakchai So-In and Nhu Gia Nguyen: Two Energy-Efficient Cluster
Head Selection Techniques Based on Distance for Wireless Sensor Networks. Interna-
tional Computer Science and Engineering Conference (ICSEC) - (2014).

ISBN :978-81-945631-7-4

57
6. Sachin Gajjar, Mohanchur Sarkar and Kankar Dasgupta: Self Organized Flexible, La-
tency and Energy Efficient Protocol for Wireless Sensor Networks. International Jour-
nals Wireless Info Networks (2014).
7. Kamil Samara and Hossein Hosseini: A Routing Protocol for Wireless Sensor Net-
works with Load Balancing. IEEE pp. 156-161 (2016).
8. Haidar Safa: A novel localization algorithm for large scale wireless sensor networks.
Computer Communications pp. 32–46 (2014).
9. Chaitanya Vijaykumar Mahamuni: A Military Surveillance System based on Wireless
Sensor Networks with Extended Coverage Life. IEEE (2016).
10. Anil K. Jain and Umut Uludag: Hiding Fingerprint Minutiae in Images: Computer Sci-
ence & Engineering Department. IEEE Transaction on Pattern Analysis and Machine
Intelligence, Vol. 25, No. 11 (2003).
11. Yunxia Chen and Qing Zhao: On the Lifetime of Wireless Sensor Networks. IEEE
Communications Letters, Vol. 9, No. 11 (2005).
12. Daniel Kifetew Shenkutie & Prashanth Kumar Patil Shinde: Residual Energy Monitor-
ing in Wireless Sensor Networks. Technical report, IDE1152 (2011).
13. Vibhav Kumar Sachan, Syed Akhtar Imam and M. T. Beg: Energy-efficient Communi-
cation Methods in Wireless Sensor Networks, A Critical Review. International Journal
of Computer Applications (0975 – 8887) Vol. 39– No.17 (2012).
14. https://www.sciencedirect.com/topics/computer-science/initial-energy.
15. http://jscljabalpur.org/wp-content/uploads/2019/06/vlcsnap-2019-05-25-
14h25m44s073.png

ISBN :978-81-945631-7-4

58
Sybil Attack in Vehicular Ad hoc Network (VANET) – A
Survey

Nishtha1[0000-0002-1242-771X] Amol Vasudeva2[0000-0002-6909-0820] Manu Sood3[0000-0002-


4946-9550]

1, 3 Himachal Pradesh University, Shimla, India

nishtha16@yahoo.com, soodm_67@yahoo.com
2Jaypee University of Information Technology, Waknaghat, Solan, Himachal Pradesh, India

amol.vasudeva@juit.ac.in

Abstract. IEEE802.11p specifies standards for Inter Vehicular Communication


(IVC). An instantaneous network formed among vehicles when vehicles come
in the radio range of each other is known as Vehicular Ad hoc Network
(VANET). The primary reason for the deployment of VANET is to have a safe
and comfortable drive. Numerous applications are being developed for VANET,
where one critical requirement of each of these applications is on-time
information delivery. Due to inherent issues present is VANET, on-time
delivery of information is not always feasible as VANETs are vulnerable to
numerous kinds of attacks. One such deadly attack is Sybil attack, extremely
prominent in infrastructureless VANETs where vehicles in the absence of any
centralized management communicate in peer to peer manner with one another.
In a Sybil attack, a malicious user present in VANET launches one or more
additional vehicles known as Sybil vehicles. These Sybil vehicles do not exist
and are virtual vehicles in reality. Due to the absence of centralized control,
Sybil vehicle is not identified as a virtual vehicle by other vehicles present in
the network. The addition of Sybil vehicle(s), however virtual, increases the
total number of vehicles present in the VANET. Sybil vehicle(s) disrupts all
those mechanisms in VANET that directly or indirectly deal with the total
number of vehicles and these mechanisms are such as routing mechanisms, fair
allocation of network resources. This paper is a survey of significant research
work carried out on the Sybil attack in VANET.

Keywords: Vehicular Ad hoc Network (VANET), Vehicle to Infrastructure


(V2I) communication, Vehicle to Vehicle (V2V) communication, Sybil attack,
Sybil vehicles, Sybil launcher.

1 Introduction

Wireless ad hoc networks are capable of on-the-spot network deployment for


accomplishing a precise task. Working Group IEEE specifies the standards IEEE
802.11 for these wireless ad hoc networks. The framework IEEE 802.11 specify

ISBN: 978-81-945631-7-4

59
standards for various wireless ad hoc networks such as IEEE 802.11a, IEEE 802.11b
(Wi Fi), IEEE 802.11g [1], [2], [3].
One of the prominent modifications of IEEE 802.11 technology is 802.11p
specifically designed for inter vehicular communication (IVC) [3], [4]. IEEE 1609.4
specifies standards for operation across multiple channels [3]. The combination of
these two technologies is Wireless Access in Vehicular Environments (WAVE) [3].
These standards stipulate a wireless ad hoc network where nodes are vehicles, and this
kind of network is exclusively termed as Vehicular Ad hoc Network (VANET) [2].
Whenever vehicles come in the transmission range of one other, these vehicles
automatically form a network using radio signals for information exchange. The
communication among vehicles is achievable because every vehicle taking part in the
VANET has inbuilt intelligent units known as On Board Units (OBUs). These OBUs
have processors, sensors, Global Positioning System (GPS) unit, memory, and radio
interfaces for forming connections with other vehicles. These vehicles are rich in
resources and may perform high computations, and have high sensing power [2], [3].
Communication among vehicles is carried out using radio signals within their
specified range. Whenever a vehicle requires communication with other vehicles that
are falling outside its radio range, the message is delivered in a multi hop manner. In
multi hop approach, the packet is forwarded to intermediate vehicles using carry
forward approach till the packet reaches the intended destination [2], [3].
To provide secure and comfortable driving is the prime reason behind VANET [2].
Several applications exclusive for this domain are being emerged. Varied VANET
applications include traffic related information, roadside service information, relevant
local information, mobile commerce, and entertainment services [2]. The foremost
requirement of these applications is the timely delivery of the information. Besides,
these applications require reliable, exact information delivery with Quality of Service
(QoS) [2], [3].
Dissimilar from other categories of wireless ad hoc networks, VANETs may be
deployed using any of these: (i) Infrastructure based/Vehicle to Infrastructure (V2I)
communication/Pure Cellular/WLAN architecture (ii) Infrastructureless/Vehicle to
Vehicle (V2V) communication/Pure Ad hoc architecture (iii) Hybrid architecture. In
Infrastructure based/Vehicle to Infrastructure (V2I) communication/Pure
Cellular/WLAN architecture, there always exist predefined infrastructure such as
Road Side Units (RSUs) positioned at a uniform distance throughout the road. These
predefined infrastructures behave in a similar manner, such as the Access Points
(APs), where each RSU manages the network in its range. In this architecture, the
communication is centralized and takes place between the vehicle and the fixed
infrastructure. This mode of communication among vehicles to infrastructure is
known as Vehicle to Infrastructure (V2I) communication [3], [4]. Infrastructure
less/Vehicle to Vehicle (V2V) communication/Pure Ad hoc architecture of VANET
takes place without any centralized infrastructure, and vehicles communicate in peer
to peer manner using carry forwarding strategy with one another. In this peculiar
architecture, without the existence of fixed infrastructure, vehicles communicate
directly by forming interconnections with one other, known as Vehicle to Vehicle

ISBN: 978-81-945631-7-4

60
(V2V) communication mode in VANET [4]. Both the V2V and V2I communications
are carried out in the hybrid architecture of VANET [4].
Vehicles in VANET move at a very high speed and these vehicles frequently enter
or leave the network. This makes VANET a highly dynamic network. Vehicles
participating in VANET are also of different make and model. Moreover, vehicle
authentication methods are not appropriate in VANET. The only way of vehicle
recognition is by their MAC/IP addresses [5], [6]. The malicious user may easily
spoof these addresses. All these combined features make VANET extremely
vulnerable to various attacks. One such attack is a Sybil attack that is highly probable
in networks without centralized control, and where the nodes communicate in peer to
peer manner [2]. Therefore, infrastructure based/V2I communication/pure
cellular/WLAN architecture of VANET with the involvement of centralized fixed
infrastructure are less susceptible to Sybil attack. In comparison, the
infrastructureless/V2V communication/Pure Ad hoc deployment of VANET without
any centralized control where vehicles communicate in peer to peer manner is highly
vulnerable to Sybil attack. Sybil attack is a type of spoofing attack where a malicious
attacker present in VANET generates one or more virtual vehicles by using fake
identities in infrastructureless VANETs. These virtual vehicles that do not precisely
exist in the network but seem like a legitimate vehicle to all other vehicles are known
as Sybil vehicles [5], [6]. The malicious vehicle that generates these Sybil vehicles is
known as Sybil launcher. The existence of new vehicles disturbs all those mechanisms
where a total of vehicles play an essential role, such as fair resource allocation, voting
management, routing mechanism. Thus, the presence of a Sybil vehicle causes
excessive disruption in VANET. This paper presents a detailed survey of work carried
out on the Sybil attack in the field of VANETs. The remaining part of the paper is
organized as follows. Section 2 presents the survey of a Sybil attack on VANET.
Section 3 portrays Sybil attack in VANET in tabular form with the conclusion and
future scope in the end.

2 Survey of Sybil attack in VANET

Many research papers discuss various attacks to which VANETs are susceptible,
including Sybil attack in VANETs [6]-[10].
B. Xiao et al. (2006) discuss a Sybil detection mechanism in VANET. This
mechanism requires GPS information to be accurate, and all vehicles to be equipped
with the same radio modules. The roadside base stations are to be deployed along the
entire road, and the identity of every vehicle participating in VANET is to be
authenticated by Electronic License Plate (EPL). This mechanism uses signal strength
received from the vehicle and compares whether the position claimed by the vehicle
and the position value calculated through signal strength differ. In case the compared
values vary, then the vehicle is assumed to be a Sybil vehicle [11]. T. Zhou et al.
(2007) propose a framework for the detection of a Sybil attack. The Department of the
Motor Vehicle (DMV) preserves the records of the vehicle and allocates certified
pseudonyms to vehicles. These certified pseudonyms are only given once to the

ISBN: 978-81-945631-7-4

61
vehicles, either at the vehicle registration time or at its renewal time. Roadside boxes
RSBs behave as a middle point between vehicles and the DMV for data distribution.
These RSBs by paying attention to vehicle activities, inform the DMV about any
suspicious vehicle in the VANET [12]. G. Guette et al. (2007) propose a Sybil
detection method using signal strength and directional antenna. The underlying
assumption used in this mechanism is that only a few areas may have Sybil vehicles
and authors have characterized those areas to detect Sybil vehicles. [13]. T. Zhou et
al. (2011) propose a method for Sybil detection with the assistance of the DMV that
behaves as a centralized authority. This mechanism provides unique pseudonyms to
the vehicles, thereby preserving the privacy of every vehicle. These pseudonyms are
stored in the Road Side Units (RSUs). By overhearing these pseudonyms, the RSB
verifies the authenticity of pseudonyms and hence, that of a particular vehicle [14]. M.
Rahbari et al. (2011) present and implement a cryptography based scheme for the
detection of Sybil attack in VANET. This method relies on fixed key infrastructure
for detecting a Sybil attack [15].
K.M. Rabieh et al. (2011) suggest a Public Key Infrastructure (PKI) based method
for the detection of Sybil attack in VANET. In this mechanism, the RSUs are placed
at a fixed distance all along the road, and the DMV acts as a centralized control that
holds personal information such as personal ID, digital signature. Utilizing this
information, Sybil vehicles are detected [16]. P. Kafil et al. (2012) present three
different categories to launch a Sybil attack communication, identity, and
participation. The authors have analyzed that the position of a Sybil launcher plays an
essential part in causing disruption to the network [17]. Naveen et al. (2013) propose a
Sybil detection and mitigation mechanism using the AODV protocol in VANET. A
new field in the AODV known as Secondary ID (SCID) is introduced. The
combination of sequence numbers with SCID uniquely identifies every vehicle in the
VANET and thus can quickly identify a Sybil vehicle [18]. T. M. D. Sales et al.
(2014) present a Sybil detection protocol working in three phases: registration,
assigning of pseudonym to the vehicle, and the authentication phase. This mechanism
preserves privacy using a multilevel architecture, and the use of pseudonyms and
group signatures helps in identifying the Sybil attack [19]. R. Hussain et al. (2014)
suggest the use of a centralized infrastructure such as an RSU for the detection of
Sybil attack. In this algorithm, the RSUs distribute pseudonyms to the vehicles, and
the data gathered through beacons are used to detect Sybil attack [20]. D. Jin et al.
(2014), without any pre existing infrastructure, propose a Sybil attack detection
mechanism that uses the physical measurement of message transmission to detect
Sybil vehicles [21].
Few papers discuss existing Sybil detection mechanisms [22], [23], [24]. P. V.
Kumar et al. present a system where the prevention algorithm uses the RSU to restrict
the allocation of timestamps at the initial stage to prevent Sybil attack. The system by
using batch authentication and key management scheme authenticate several requests
concurrently. This mechanism using Priority Batch Verification Algorithm (PBVA)
gives priority in processing the requests send by emergency vehicles such as an
ambulance, and such requests are instantly processed without any delay [25].

ISBN: 978-81-945631-7-4

62
H. Kaur et al. (2015) have presented an Intrusion Detection System (IDS) using a
Genetic algorithm for the prevention of Sybil attack. The authors have also analyzed
Sybil attack in the VANET using various network parameters with and without
employing a genetic algorithm and by varying the node configurations [26]. S. Gupta
et al. (2015) present a mechanism for the detection of Sybil attack in VANET. The
mechanism preserves the privacy of vehicles and is implemented using a genetic
algorithm [27]. K. Rabieh et al. (2015) propose a scheme to detect the Sybil attack in
VANET. The cross layer scheme is used that facilitates RSU to recognize a Sybil
vehicle. The logic behind this mechanism is to confirm the position of the vehicle(s)
as Sybil vehicle does not present at the position specified by it [28]. J. Grover et al.
(2015) have studied the disruption caused by a Sybil attack on VANET. The authors
though simulations have executed Sybil attach and have analyzed the performance of
VANET under such attack. The authors also present a Sybil detection mechanism for
Infrastructure based VANETs. The detection mechanism requires RSU to be placed
all along the road. A single RSU behaves as centralized management in its area and it
is used to store and authenticate parameters such as RSS value, the distance of a
vehicle. This enables the detection of a Sybil node [29]. A. Suman et al. (2016) have
explained routing protocols available for VANET. The authors discuss various
implications that Sybil attack might cause in the routing mechanism in VANET. To
show how the Sybil attack deteriorates the performance of routing protocols in
VANET, the authors have implemented a Sybil attack on VANET using AODV
protocol. Various network performance parameters are used to check the impact of the
Sybil attack in VANET [30].
A. Chawla et al. (2016) have presented an exhaustive survey of various techniques
used to detect Sybil attack in VANET [31]. S. Arora et al. (2016) have used the
OPNET simulator to examine the performance of AODV routing protocol under a
Sybil attack. The authors evaluate that AODV performed better under a Sybil attack
as compared to various other routing protocols available for VANET. They conclude
that AODV requires further improvement to deal with Sybil attack [32]. A. K. Sharma
et al. (2016) propose a model for the detection of a Sybil attack. In this technique, the
pseudo certificates generated help in preserving the privacy of the vehicle and with
the cooperation of neighboring vehicles detect the Sybil vehicle [33]. D. P. Mishra et
al. (2016) propose a scheme to detect Sybil attack using vehicle authentication using
digital signatures [34]. S. Gupta et al. (2016) present a vehicle privacy preserving
system using a bacterial foraging optimization algorithm to detect of Sybil attack [35].
P. Rawat et al. (2016) suggest a modification in the AODV routing protocol by using
an active route timeout concept for detection of Sybil attack in VANET, and the
protocol implementation is carried out in OPNET [36]. S. Saini et al. (2016) present a
survey on Sybil attack with various routing protocols existing for VANET [37]. A. S.
Bojnord et al. (2017) present a Sybil detection mechanism based on a fuzzy detection
mechanism [38]. X. Feng et al. (2017) provide a method to prevent Sybil attack
against multi source Sybil attacks. The mechanism ensures the privacy of a vehicle
using a trusted source to issue a certificate to the vehicles falling in its communication
range. By setting a reputation and trust threshold for each event, the allocation of false
messages is controlled [39]. A. Panchal et al. (2017) propose a technique for the

ISBN: 978-81-945631-7-4

63
detection of Sybil vehicles with stolen identities in VANET. In this technique, in case
a vehicle tries to distribute the false message, then the neighbor vehicles cooperate
with one other to build a trust value to prevent Sybil attack [40]. C.O. Iwendi et al.
(2018) present a Sybil attack detection technique based on meta heuristic technique
using a simulation framework. This technique uses a spider monkey strategy to check
Sybil attacks [41]. Z. A. Abdulkader et al. (2018) present a survey of various Sybil
detection techniques available in VANET [42].
S. Hamdan et al. (2018) explain various mechanisms available for Sybil attack
detection in VANET. The authors have proposed a hybrid algorithm utilizing Privacy
Preserving Detection of Abuses of Pseudonyms (P2DAP) as well as a footprint
algorithm for the detection of a Sybil attack in VANET [43]. H. Hamed et al. (2018)
have proposed and executed a Sybil attack detection scheme for a city environment.
In this scheme, the prime assumption is the availability of RSUs. A single mobile
vehicle may generally be in the proximity of one RSU. Whenever a vehicle comes in
the proximity of an RSU, the RSU provides a unique identification to the vehicle.
This logic is exploited to detect a Sybil attack in the city environment [44].
K. Singh et al. (2018) review various techniques for Sybil attack detection in
VANET. The authors have also presented a Sybil attack detection scheme based on
respective signal strength and monitor mode, where the RSU helps in the detection of
Sybil node [45]. K. Selvakumar et al. (2019) propose an Elliptic Curve Encryption
and Digital Signature (ECEBS) for security enhancement that uses digital signatures
for message communication in VANET. The authors also propose a Preference Batch
Authentication Algorithm (PRBAA) to deal with the Sybil attack. In this algorithm,
whenever vehicles need to communicate, the vehicle has to fetch a timestamp from
the RSU. At times whenever the RSU gets several requests from the vehicles
simultaneously, the RSU, even in the time of crisis, gives preference to vehicles such
as fire vehicles, ambulance [46]. Table 1 displays the literature work carried on Sybil
attack in VANET.

Table 1. Presents the literature work carried out on Sybil attack in VANET
S.N. Title Author Attack Details
1. Detection and localization of B. Xiao et · Mechanism for the detection of Sybil
Sybil nodes in VANETs al. (2006) vehicles based on RSSI
[11] · Require correct GPS information
· Require vehicles to be equipped with the
same radio module
· Vehicle authentication by Electronic
License Plate (EPL)
2. Privacy-Preserving T. Zhou et · Detection Mechanism using
Detection of Sybil Attacks in al. (2007) Centralized Authority
Vehicular Ad Hoc Networks · DMV maintains records & distributes
[12] synonyms to the vehicle
· Roadside Base units (RSBs) act as
intermediates
· Distribution of Pseudonyms at
registration or renewal.
3. On the Sybil attack detection G. Guette · Sybil detection using signal strength &

ISBN: 978-81-945631-7-4

64
in VANET [13] et al. directional antenna
(2007) · Identify the area where Sybil vehicle
may be present
4. P2DAP - Sybil Attacks T. Zhou et · Privacy preserving scheme P2DAP for
Detection in Vehicular Ad al. (2011) Sybil detection
Hoc Networks [14] · Centralized Authority-DMV & RSU
· Distribution of Pseudonyms
5. Efficient Detection of Sybil M. · Cryptography based scheme for the
Attack based on Rahbari et Detection of Sybil attack
Cryptography in VANET al. (2011) · Require fixed infrastructure such as
[15] RSUs
6. Combating Sybil Attacks in K.M. · PKI based method for detection of
Vehicular Ad Hoc Networks Rabieh et Sybil attack.
[16] al. (2011) · Require RSUs and DMV. Where DMV
acts as centralized management.
7. Modeling Sybil Attacker P. Kafil et · Sybil attacks implementation in
Behavior in VANETs [17] al. (2012) VANET
· The authors evaluate the behavior of
Sybil attacker
8. Detection and Prevention Naveen, · Sybil detection and mitigation
Using AODV in VANET R. Gill mechanism using AODV
[18] (2013) · New field in the AODV-Secondary ID
(SCID) to uniquely identify every
vehicle
9. A Privacy-Preserving T. M. · A Sybil detection protocol that works
Authentication and Sybil Sales et in three phases registration, allocation
Detection Protocol for al. (2014) of pseudonyms, the authentication
Vehicular Ad Hoc Networks phase
[19] · Utilize pseudonyms and group
signature
10. On Secure and Privacy- R. · Detection and prevention algorithm
Aware Sybil Attack Hussain, · Require centralized infrastructure such
Detection in Vehicular H. Oh as RSU
Communications [20] (2014) · Physical measurement of the message
to detect Sybil nodes
11. A Traffic Flow Theory D. Jin and · Without any pre existing infrastructure
Aided Physical Measurement J. Song · Physical measurement of message
Based Sybil Nodes Detection (2014) transmission
Mechanism in Vehicular Ad-
hoc Networks [21]
12. Detection and Localization K. · Various existing Sybil detection
of Sybil Attack in VANET: Malathi et mechanisms
A Review [22] al. (2014)
13. Defense mechanisms against M. A. · Explain various Sybil detection
Sybil attack in vehicular ad Mohamm mechanisms
hoc network [23] adi et al.
(2014)
14. Prevention of Sybil attack P. V. · RSU restricts the allocation of
and priority batch Kumar et timestamps at the initial stage
verification in VANETs [25] al. (2014) · Batch authentication & key
management scheme simultaneously
process several requests

ISBN: 978-81-945631-7-4

65
15 Efficient Detection & H. Kaur · Present an Intrusion Detection System
Prevention of Sybil Attack in and P. (IDS) using a Genetic algorithm for the
VANET [26] Bansal prevention of Sybil attack
(2015)
16. Prevention of Sybil attacks S. Gupta · Prevention of Sybil attack in VANET
in VANETs using genetic et al. using a genetic approach
approach [27] (2015)
17. Cross-Layer Scheme for K. · The cross layer scheme is used that
Detecting Large-scale Rabieh et facilitates RSU to recognize a Sybil
Colluding Sybil Attack in al. (2015) vehicle
VANETs [28]
18. Multivariate verification for J. Grover · Detection mechanism for Infrastructure
Sybil attack detection in et al. based VANET with RSUs requirement
VANET [29] (2015) · Use RSS value to calculate the distance
of a neighbor vehicle
19. A Behavioral Study of Sybil A. Suman · To show the impact of Sybil attack on
Attack on Vehicular et al. routing protocols
Network [30] (2016) · A Sybil attack using AODV
20. Comparative Analysis of A. · Present a comprehensive survey of
Sybil Attack Detection Chawala various techniques to detect Sybil
Techniques in VANETs [31] et al. attack in VANET
(2016)
21. Performance Evaluation of S. Arora · Compute the performance of AODV
Vehicular Ad Hoc Networks et al. routing protocol with Sybil attack
under Sybil Attack [32] (2016)
22. Sybil Attack Prevention and A. K. · Technique for detection of Sybil attack
Detection in Vehicular Ad Sharma et using pseudo certificates
hoc Network [33] al. (2016) · Beacons for neighbor detection, RSUs
& Certification Authority
23. A Novel Approach to Detect D. P. · A scheme to detect Sybil attack using
Sybil Attack in VANET [34] Mishra et node authentication using digital
al. (2016) signatures
24. Prevention of Sybil Attacks S. Gupta · Present an algorithm using a bacterial
in VANETs Using Bacterial et al. foraging optimization to detect of Sybil
Foraging Optimizations (2016) attack
Algorithm [35]
25. Prevention of Sybil attack in P. Rawat · Use bacterial foraging optimization
vehicular ad hoc networks et al. algorithm for prevention of Sybil
using active route timeout (2016) attack
approach [36]
26. A Detail Review on Sybil S. Saini et · Present a survey on Sybil attack with
Attack and Various Routing al. (2016) various routing protocols in VANET
Protocols in Vehicular Ad
Hoc Network [37]
27. A Secure Model for A. S. · Sybil detection mechanism based on a
Prevention of Sybil Attack in Bojnord et fuzzy detection mechanism
Vehicular Ad Hoc Networks al. (2017)
[38]
28. A method for defensing X. Feng et · Prevent Sybil attack against multi
against multi-source Sybil al. (2017) source Sybil attacks
attacks in VANET [39] · Using a trusted source to issue a
certificate

ISBN: 978-81-945631-7-4

66
29. Segregation of Sybil Attack A. · For detection of Sybil attack
using Neighbouring Panchal et · Neighbour vehicles cooperate with one
Information in VANET [40] al. (2017) other to build a trust value
30. On Detection of Sybil Attack C.O · Sybil detection based on meta heuristic
in Large-Scale VANETs Iwendi et technique
using Spider-Monkey [41] al. (2018)
31 A Survey on Sybil Attack Z. A. · Survey of various Sybil detection
Detection in Vehicular Ad Abdulkad techniques
hoc Networks (VANET) er et al.
[42] (2018)
32. Detecting Sybil attacks in S. · Sybil detection algorithm
vehicular ad hoc networks Hamdan · Hybrid algorithm utilizing P2DAP as
[43] et al. well as footprint algorithm
(2018)
33. Sybil Attack Detection in H. Hamed · A Sybil attack detection scheme for a
Urban VANETs Based on et al. city environment
RSU Support [44] (2018) · Existence of RSU
34. Evaluation of proposed K. Singh · Review various techniques for Sybil
technique for detection of et al. attack detection in VANET
Sybil attack in VANET [45] (2018)
35. Security Issues and K. · Propose an Elliptic Curve Encryption
Analysing Sybil Attack Selvakum and Digital Signature (ECEBS) for
Detection in VANET [46] -ar et al. security enhancement that uses digital
(2019) · Before communication vehicles
require timestamp from the RSU
36. Analysis of Sybil attack Sudha et · Review various existing mechanisms
isolation technique in al. (2019) for the detection and prevention of
VANET [24] Sybil attack

Conclusion and Future work

VANET is a communication network, and the sole rationale for its deployment
entirely relies on the on-time information delivery of its numerous applications. In
addition to the timely delivery of information, the information delivered should be
reliable, accurate with QoS, and low latency communication. Sybil attack through its
launched Sybil vehicles may disturb the VANET. Sybil launcher through its Sybil
vehicles may increase the time delay, increase the latency of communication, or
deliver fake information by modifying, truncating, or dropping few or all data packets
in VANET. This disruption in communication shows that the Sybil attack in VANET
is the most hazardous attack, and appropriate measures are required to prevent this
attack.
The above literature survey indicates that very little work has been conducted to
eliminate Sybil attack in VANET. Most of the papers reveal that the existing Sybil
attack detection and prevention mechanisms are insufficient. Moreover, most of the
detection and prevention mechanisms have been proposed for infrastructure based
VANET, require a centralized authority such as a Certification Authorities (CA) or
Department of Motor Vehicle (DMV) for authentication of vehicles, to detect and

ISBN: 978-81-945631-7-4

67
further prevent Sybil attack. None of the research papers in the survey talks
distinctively about Sybil attack in the infrastructureless/pure ad hoc deployment of
VANETs where Sybil attack is most prevalent. Thus appropriate mechanisms for
detection and prevention of Sybil attack in infrastructureless VANETs are the prime
requirements for the sustainability of these networks.

References
1. Chandramouli V.: A Detailed Study on Wireless LAN Technologies. (Dept. of Comp. Sci.
and Engineering, Univ. of Texas at Arlington),
http://www.uta.edu/oit/policy/ns/docs/wireless-paper-vijay.pdf. last accessed 2019/12/15.
2. Pietro, R. D., Guarino, S., Verde, N.V., Domingo-Ferrer, J.: Security in wireless ad-hoc
networks - a survey. Journal of Computer Communications 51, 1–20 (2014).
3. Papadimitratos, P., Fortelle, A.D.L., Evenssen, K., Brignolo, R., Cosenza, S.: Vehicular
communication systems: enabling technologies, applications, and future outlook on
intelligent transportation. Communication Magazine IEEE 47(11), 84–95 (2009).
4. Li, F., Wang, Y.: Routing in vehicular ad hoc networks: a survey. Vehicular Technology
Magazine IEEE 2(2), 12–22 (2007).
5. Newsome, J, Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis &
defenses. In: 3rd International Symposium on Information Processing in Sensor Networks.
pp. 259–268. IEEE, Berkeley, USA (2004).
6. Al-Kahtani, M. S.: Survey on security attacks in vehicular ad hoc networks (vanets). In:
6th International Conference on Signal Processing and Communication Systems. pp. 1–9.
Gold Coast, QLD (2012).
7. Samara, G., Wafaa, A.H., Salihy, A., Sures, R.: Security Analysis of Vehicular Ad Hoc
Networks (VANET). In: Second International Conference on Network Applications,
Protocols and Services, IEEE, Malaysia (2010).
8. La, V.H., Cavalli, A.: Security attacks and solutions in vehicular ad hoc networks: a
survey. International Journal of Ad hoc Networking Systems 4(2), 1–20 (2014).
9. Mane, A.: Sybil attack in VANET. International Journal of Computational Engineering
Research 7(3), 249-253, (2016).
10. Sharma, S., Sharma, S.: A Review: Analysis of Various Attacks in VANET. International
Journal of Advance Research in Computer Science 10(3), (2016).
11. Xiao, B., Yu, B., Gao, C.: Detection and localization of sybil nodes in VANETs. In: Proc.
of the Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor
Networks (DIWANS ’06), pp. 1–8. Los Angeles, CA, USA(2006).
12. Zhou, T., Roy, R. et al.: Privacy-preserving detection of sybil attacks in vehicular ad hoc
networks. In: 4th International Conference on Mobile and Ubiquitous Systems: Networking
& Services MobiQuitous, Philadelphia, USA (2007).
13. Guette, G., Ducourthial, B.: On the Sybil attack detection in vanet. In: IEEE International
Conference on Mobile Adhoc and Sensor Systems, Pisa, Itly (2007).
14. Zhou, T., Choudhury, R., Ning, P., Chakrabarty, K.: P2dap – sybil attacks detection in
vehicular ad hoc networks. IEEE Journal on selected areas of communications 29(3),
(2011).
15. Rahbari, M., Jamali, M.A.J.: Efficient detection of sybil attack based on cryptography in
VANET. International Journal of Network Security and its Applications 3(6), (2011).

ISBN: 978-81-945631-7-4

68
16. Rabieh, K.M., Azer, M. A.: Combating sybil attacks in vehicular ad hoc networks. In:
Ozcan A., Zizka J. Nagamalai D. (eds) Communication in Computer and Information
Science, Springer, Berlin, Heidelberg (2011).
17. Kafil, P., Fathy, M., Lighvan, M. Z.: Modeling sybil attacker behavior in VANETs. In: 9th
International ISC Conference on Information Security and Cryptology, IEEE, Iran (2012).
18. Navneet and Gill, R.: Sybil attack detection and prevention using AODV in VANET.
International Journal of Computer Science & Management Studies 13(07), (2013).
19. Sales, T. M. D., Almeida, H. O. et al.: A privacy-preserving authentication and sybil
detection protocol for vehicular ad hoc networks. In: IEEE International Conference on
Consumer Electronics (ICCE), (2014).
20. Hussain, R., Oh, H.: On secure and privacy-aware sybil attack detection in vehicular
communications. Wireless Personal Communication (2014).
21. Jin, D., Song, J.: A traffic flow theory aided physical measurement based sybil nodes
detection mechanism in vehicular ad-hoc networks. In: 13th International Conference on
Computer and Information Science (ICIS), IEEE/ACIS, Taiyan, China (2014).
22. Malathi, K., Manavalan, R.: Detection and localization of sybil attack in vanet: a review.
International Journal for Research in Applied Science and Engineering Technology 2(9),
282-293 (2014).
23. Mohammadi, M.A., Pouyan, A. A.: Defense mechanisms against sybil attack in vehicular
ad hoc network. Security Comm. Networks 8(6), (2014).
24. Sudha, Kumar, K., Malhotra, R.: Analysis of sybil attack isolation technique in vanet.
International Journal of Computer Science and Mobile Computing 8(5), 187-192 (2019).
25. Kumar, P.V., Maheshwari, M.: Prevention of sybil attack on priority batch verification in
vanets. In: International Conference on Information Communication and Embedded
Systems (ICICES2014), IEEE, India (2014).
26. Kaur, H., Bansal, P.: Efficient detection & prevention of sybil attack in vanet. International
Journal of Innovative Science, Engineering & Technology 2 (9), (2015).
27. Gupta, S., Aulakh, T. S.: Prevention of sybil attacks in vanets using genetic approach.
International Journal of Computer Science and Mobile Computing (IJCSMC) 4 (12), 88 –
102 (2015).
28. Rabieh, K., Mahmoud, M.E. A., Guo, T.N, Younis, M.: Cross-layer scheme for detecting
large-scale colluding sybil attack in vanets. In: International Conference on
Communications (ICC), IEEE, London (2015).
29. Grover, J., Gaur, M.S., Laxmi, V.: Multivariate verification for sybil attack detection in
vanet. Journal of Open Computer Science, De Gruyter (2015).
30. Suman. A., Kumar, C.: A behavioral study of sybil attack on vehicular network (2016).
31. Chawla, A., Patial, R. K., Kumar, D.: Comparative analysis of sybil attack detection
techniques in vanets. Indian Journal of Science and Technology 9(47), (2016).
32. Arora, S., Chugh, U.: Performance evaluation of vehicular ad hoc networks under sybil
attack. International Journal of Innovative Research in Computer and Communication
Engineering 4(9), (2016).
33. Sharma, A.K., Saroj, S.K., Chauhan, S.K., Saini, S. K.: Sybil attack prevention and
detection in vehicular ad hoc network. In: International Conference on Computing,
Communication and Automation (ICCCA2016), IEEE, Noida, India (2016).
34. Mishra, D. P., Asutkar, D. P.: A novel approach to detect sybil attack in VANET.
International Journal of Innovative Research in Science, Engineering and Technology
5(10), (2016).

ISBN: 978-81-945631-7-4

69
35. Gupta, S., Aulakh, T. S.: Prevention of sybil attacks in VANETs using bacterial foraging
optimizations algorithm. International Journal of Computer Science Trends and
Technology (IJCST) 4(3), (2016).
36. Rawat, P., Gupta, S.: Prevention of sybil attack in vehicular ad hoc networks using active
route timeout approach. International Journal of Science, Engineering and Technology
Research (IJSETR) 5(6), (2016).
37. Saini, S., Kumar, J.: A detail review on sybil attack and various routing protocols in
vehicular ad hoc network. International Journal of Innovative Research in Computer and
Communication Engineering, (2016).
38. Bojnord, A.S., Bojnord, H.S.: A secure model for prevention of sybil attack in vehicular ad
hoc networks. International Journal of Computer Science and Network Security 17(1),
(2017).
39. Feng. X., Li. C., Chen, D., Tang, J.: A method for defensing against multi-source sybil
attacks in VANET. Peer-to-Peer Netw. Appl., (2017).
40. Panchal, A., Singh, D.: Segregation of sybil attack using neighbouring information in
VANET. International Advanced Research Journal in Science, Engineering and
Technology, (2017).
41. Iwendi, C. O, Uddin, M., Ansere, J. A., Nkurunziza, P., Anajemba, J. H., Bashir, A. K.: On
detection of sybil attack in large-scale VANETs using spider-monkey technique. IEEE.
(2017).
42. Abdulkader, Z. A, Abdullah, A., Abdullah, M.T., Zukarnain, Z. A.: A survey on sybil
attack detection in vehicular ad hoc networks (VANET). Journal of Computers. 29(2), 1-6
(2018).
43. Hamdan, S., Hudaib, S. Awajan, S.: Detecting sybil attacks in vehicular ad hoc networks.
International Journal of Parallel, Emergent and Distributed Systems (2019).
44. Hamed. H., Haddad, A., Haghighi, G.: Sybil attack detection in urban VANETs based on
RSU support. In: 26th Iranian Conference on Electrical Engineering (ICEE2018), (2018).
45. Singh, K, Kaur, H.: Evaluation of proposed technique for detection of sybil attack in
VANET. International Journal of Scientific Research in Computer Science (2018).
46. Selvakumar, K., Kumar, S. N.: Security issues and analyzing sybil attack detection in
VANET. International Journal of Recent Technology and Engineering (IJRTE) 7(5),
(2019).

ISBN: 978-81-945631-7-4

70
Mitigating Aspects of Disadvantages in Biodiesel
Production

Malayaj Srivastava
Department of Chemical Engineering,
Pandit Deendayal Petroleum University, Gandhinagar, Gujarat, India

Abstract. Biofuels are a developing kind of fuel whose origin is biomass. Among
them, many different kind of fuels can be found: bioethanol, biobutanol, bio-
diesel, vegetable oils, bio methanol, pyrolysis oils, biogas, and biohydrogen. This
project is concerned with the biodiesel and mainly with the mitigation aspects
regarding the disadvantages in the production of biodiesel.

Keywords:

1 Introduction

In 1893, Rudolph Diesel firstly operated his new engines using vegetable oil (peanut
oil) where petroleum was not available at that time. His first experiment has inspired
many researchers to study further about biodiesel. Since then, biodiesel production is
developed until now.
For several years, warnings about the depletion of the oil reserves have been transmit-
ted. However, nowadays, that is not a reality, or, at least, it is not a public reality. It is
almost impossible to determine how long it will be possible to live in the petroleum era.
Nevertheless, it is a reality that, eventually, the problem will have to be faced.

Biodiesel has a great potential due to its environmental benefits mainly in the urban
areas. Also, this combustive has been seen as a strategic source of renewable energy to
substitute the diesel and other petroleum products [1]. Biodiesel is an alternative to
diesel which has numerous benefits, such as its applicability to be used individually or
blended with diesel in diesel engines without requiring any engine modifications. More-
over, it emits lower air pollutants such as carbon monoxide and sulphur dioxide, etc.
as compared to those emitted from the combustion of diesel [2].Afterwards, that bio-
diesel can be used blended with mineral diesel in different proportions or without blend-
ing, what is called B100, in diesel engines. Biodiesel is also suitable for direct burning.

ISBN :978-81-945631-7-4

71
2 Disadvantages in the Main technologies used for the
production of biodiesel

The transesterification reaction is the most common technology of biodiesel production


that proceeds with catalyst or without any catalyst by using alcohols. Generally, in the
absence of a catalyst, transesterification reaction is very slow. The most important op-
erating conditions which influence the transesterification process are reaction tempera-
ture, reaction time, pressure, ratio of alcohol to oil, concentration and type of catalyst,
mixing intensity, and kind of feedstock.
The type of catalysis can be homogeneous or heterogeneous respectively if the catalyst
remains in the same (liquid) phase to that of the reactants during transesterification or
if the catalyst remains in a different phase (solid, immiscible liquid, or gaseous).

3 Disadvantages in the catalytic methods

3.1 Homogeneous catalysis


Homogenous catalysts are categorized into basic and acidic catalysts. The homogenous
process especially the basic type requires a high purity of feedstock. The homogeneous
catalysts have some disadvantages, such as the catalyst cannot be reused, high con-
sumption of energy and costly separation from the reaction mixture, large amounts of
wastewater, and produce, as a byproduct, a low grade of glycerol [3]. Biodiesel is gen-
erally produced using homogeneous base catalysts, such as alkaline metal alkoxides or
hydroxides, and sodium or potassium carbonates [4,5,6]

Homogeneous base catalysts are commonly used in the industries due to modest oper-
ation condition, high conversion, low reaction time (typically 1 h), high catalytic activ-
ity, wide availability, and low cost. In general, base catalytic transesterification pro-
cesses are carried out at low temperatures and pressures (333–338 K and 1.4–4.2 bar)
with low catalyst concentrations (0.5–2 wt%) [7,8].

The limitations of homogenous base catalyst are due to the sensitivity to purity of reac-
tants, free fatty acid content, as well as to the water concentration of the sample. When
the oils contain free fatty acid and water, they can form large amount of soap. The fatty
acids will react with the basic catalyst to produce soaps which inhibit the separation of
glycerin and biodiesel. Water makes the reaction to partially change to saponification
and reduces catalyst efficiency. The soap causes an increase in viscosity and formation
of gels which reduces ester yield and hinders the separation of glycerol[7,8].

Acid catalytic transesterification of biodiesel is generally used with low-cost feedstock.


Sulfuric acid, hydrochloric acid, and sulfonic acid are the common acid catalysts [12,
14]. In acid-catalyzed transesterification, the alcohol acts both as a solvent and as es-
terification reagent. The process consists in mixing the oil directly with the acidified
alcohol, so that separation and transesterification occur in single step. One advantage

ISBN :978-81-945631-7-4

72
of homogeneous acid catalytic over homogeneous base catalytic transesterification is
their low susceptibility to the presence of free fatty acid in the feedstock [6] [8]. How-
ever, homogeneous acid catalytic transesterification is more sensitive to water contents
of the feedstock [14]. The presence of water inhibits the conversion to biodiesel. Other
disadvantages are corrosion of equipment, more waste, formation of secondary prod-
ucts, higher temperature, long reaction times, and weak catalytic activity [5] [8] [9].

3.2 Heterogeneous catalysis

Heterogeneous catalysis offers simplified production; easy separation, purification, and


reuse; low cost; and lower environmental impact, besides not yielding soap. Other ad-
vantages of the heterogeneous process are higher yield of biodiesel and higher purity
of glycerin, as well as lower cost of catalyst, and the heterogeneous catalytic transester-
ification process can still tolerate extreme reaction conditions. The temperature could
go from 70 °C to as high as 200 °C to achieve more than 95 % of yield using MgO,
CaO, and TiO2 catalysts [10, 11].

4 Disadvantages with Noncatalytic methods.

There are two noncatalytic transesterification processes. These are the supercritical al-
cohol processes[5, 8].

Supercritical alcohol methods consist of using high pressure and temperature instead of
using catalysts to carry out the transesterification reaction [5,10]. The reaction is fast
and conversion rises to 50–95 % for the first 10 min, but it requires a temperature range
of 250–400 °C. This method has proved to be the most promising process, and it uses
the supercritical conditions of alcohols, such as methanol, ethanol, propanol, or butanol.
The disadvantages of the supercritical methods are the necessity of high pressure and.
temperature and high methanol to oil ratios and consequently expensive production [5
10].

The rate of conversion of oil into ester is very slow due to low solubility of methanol
in oil. A way to overcome these problems without using a catalyst is the use of cosol-
vent which is soluble in both methanol and oil . The result is a fast reaction, on the order
of 5–10 min, without catalyst residues. Tetrahydrofuran is an example of such cosol-
vents. It has a boiling point very close to that of methanol, and the system requires a
rather low operating temperature of 30 °C. The process consists in the conversion of
triglycerides and free fatty acids at atmospheric pressures and near ambient tempera-
tures in a two-step, single-phase, and continuous process, all in less than 90 min. This
process can to convert not only vegetable oils but also waste cooking oils and animal
fats [12].

ISBN :978-81-945631-7-4

73
References

[1] Doná, Cardozo-Filho, Silva, and Castilhos. "Biodiesel production using su-
percritical methyl acetate in a tubular packed bed reactor." Fuel processing
technology 106: 605-610, 2013.
[2] Goembira, Fadjar, Kosuke Matsuura, and Shiro Saka. "Biodiesel production
from rapeseed oil by various supercritical carboxylate esters." Fuel 97: 373-
378, 2012.
[3] Ma F, Clements LD, Hana MA (1998) The effects of catalyst, free fatty ac-
ids and water on transesterification of beef tallow. Trans ASAE 41:1261–
1264
[4] Rashid U, Anwar F (2008) Production of biodiesel through optimized alka-
line catalysed transesterification of rapeseed oil. Fuel 87:265– 273
[5] Freedman B, Butterfield RO, Pryde EH (1986) Transesterification kinetics
of soybean oil. J Am Oil Chem Soc 63:1375–1380
[6] Freedman B, Pryde EH, Mounts TL (1984) Variables affecting the yields of
fatty esters from transesterified vegetable oils. J Am Oil Chem Soc
61:1638–1643
[7] Iso M, Chen B, Eguchi M, Kudo T, Shrestha S (2001) Production of bio-
diesel fuel from triglycerides and alcohol using immobilized lipase. J Mol
Catal B Enzym 16:53–58
[8] Demirbas A (2003) Biodiesel fuels from vegetable oils via catalytic and
non-catalytic supercritical alcohol transesterifications and other methods: a
survey. Energy Convers Manag 44:2093–2109
[9] Canakci M, Gerpen JV (1999) Biodiesel production via acid catalysis.
Trans ASAE 5:1203–1210 12. Enamul Hoque M, Singh A, Chuan YL
(2011) Biodiesel from low cost feedstocks: the effects of process parame-
ters on the biodiesel yield. Biomass Bioenergy 35:1582–1587
[10] César AS, Batalha MO (2010) Biodiesel production from castor oil in Bra-
zil: a difficult reality. Energy Policy 38:4031–4039
[11] Abbaszaadeh A, Ghobadian B, Omidkhah MR, Najafi G (2012) Current bi-
odiesel production technologies: a comparative review
[12] Lee JS, Saka S (2010) Biodiesel production by heterogeneous catalysts and
supercritical technologies. BioresourTechnol 101:7191– 7200

ISBN :978-81-945631-7-4

74
The effect of Design parameters on Fused Deposition
Snap-Fit components: A Review

Sumeet S. Kadam1 and Kedar H. Inamdar2


1
PG Student, Department of Mechanical Engineering (M.Tech Production)
2
Professor, Department of Mechanical Engineering,
Walchand College of Engineering,
Sangli- 416415, India
1
sumeetkadam22@gmail.com
2
Kedar.inamdar@walchandsangli.ac.in

Abstract. In this paper, the various design aspects of the fused deposited snap-
fit component are presented. The cantilever snap joints are omnipresent and
used widely in various applications. The design features like cantilever length,
width, insertion angle, and retention angle, etc. greatly influence the force
required for assembling and disassembling of two elements. Generally, snap-fit
joints are produced with injection molding. The recent development in Fused
Deposition machines allows users the freedom to fabricate various intricate
shapes. The properly selected polymer material for a given application plays an
important role. There are numerous polymers like ABS, PLA, etc which can be
easily molded and 3D printed into the required product.
Keywords: Snap-fit, Insertion angle, Retention angle, ABS, PLA, Design
features

1 Introduction

Additive manufacturing is a predominantly used manufacturing method and becoming


an important part of engineering processes. nowadays it is not only limited to
prototyping but more parts are being 3D printed for final use thus it is important to
know about the components like Snap-fit joints which are omnipresent and
manufactured using Fused Deposition Modelling or injection molding.
The first step for Fused Deposition modeling manufacturing is to develop a 3D
geometry using Computer-Aided Design software like Catia, Unigraphics, etc. The
CAD model is then converted into a Standard tessellation Language (STL) file
format. The software like CURA processes '.stl' formatted body. The orientation,
position and 3d printer parameters like bed temperature, fill density, draft, etc are
decided. The final body is then sliced into several layers with the generation of G
code and M code and provided to the FDM machine for printing [1].
There are different materials available for FDM. Acrylonitrile-butadiene-styrene
(ABS) is a popular engineering material for its properties like fine finished surface
appearance, excellent mechanical response and good processing characteristics.

ISBN :978-81-945631-7-4

75
Polylactic Acid (PLA), also provides excellent strength. PLA is less susceptible to
warpage as compared to ABS. ABS and PLA are widely used in the FDM technique.
Snap-fit joints can be used to assemble parts more efficiently without any extra tool or
fastener. The design features enable self-locking. The user doesn't necessarily have to
have access to snap-fit joints to assemble it in some cases. Because of this Snap-fit
assembly can be automatized easily [2]. A snap-fit joint can either be permanent or
temporary and can be released by a force or tools. The flexibility of features is the key
criterion for snap-fit assembly and disassembly [3].

2 Literature review

Nectarios Vidakis et al. [1] in this work, experimentally measured the compressive
strength of the parts that are built with the FDM modeling process. ABS and ABS
plus parts were built with Stratasys Dimension BST758 and Stratasys Dimension Elite
additive manufacturing machines respectively. ASTM D696 standard is used to test
the parts that were built with different building parameters. Schenk Trebel tensile
testing machine is used. ABS parts with large layer thickness had lower compressive
strength and ABS plus show the same strength for all cases. ABS plus specimen had
about double the compressive strength than ABS specimen, while ABS plus had a
lower compressive strength than the stock ABS material.
Christoph Klahn et al. [2] showed that Snap-fits are the cheapest joints. They can be
connected promptly. Many of the Snap-fit parts have geometrically complexity. Due
to some limitations of injection molding, they can be manufactured using Additive
manufacturing in small and medium scale. Existing design features were challenged
with additive manufacturing. It is found that severely complex parts can be
manufactured with Additive manufacturing. The working of the snap-fit is found to be
independent of the type of manufacturing method used for manufacturing. product
and user handling integration are improved with the ease of additive manufacturing.
Snap-fit joints are simple and cheap for joining for plastic products. The advantages
and disadvantages of the use of additive manufacturing in the case of snap-fit joints
are analyzed. The joining and the release mechanisms will benefit significantly from
the ability to create more critical kinematics in case of conventionally designed snap-
fits.
Emilio A et al. [3] used additive manufacturing technology and complex parts were
produced. Depending on the printer capability the parts produced have dimensional
constraints. The constraint can be avoided by producing different sub-components and
assembling them using snap-fits. The component is produced using the coupling of
snap-fit joints. A case study is presented to study part assembly and model division in
terms of support material requirement, feature resistance and time required for the
printing.
R. Hernandez et al. [4] examined to get maximum functionality and technical
features in the 3D printed components that were characterized under static loading
conditions like compression, tensional flexure and are manufactured in different
orientations. The results of the compression test using ASTM D695,4-point flexure
test using ASTM D790 and tensile test using ASTM D638 Type-1 were compared.

ISBN :978-81-945631-7-4

76
By using the uPrint SE Plus 3D printer, different ASTM standard components were
built in different orientations. The ABS plastic was used for the same. Even though
the orientations were altered, It is observed that there is no considerable change in the
tensile strength of ABS P430 with 9.36 MPa as the lowest value and 10.8 MPa as the
highest value.
Eamon Whalen et al. [5] used OptiStruct software for finite element analysis of
snap-fits. After creating the simulation model, the respective design changes were
made in the design aspects to get the required insertion and retention forces. In the
further part, HyperStudy and HyperMesh morphing used to optimize the snap-fit
design. The required retention and insertion forces were obtained by minimizing mass
and ensuring the integrity of the structure. The approach provided in the report can
minimize design time, material use and the failure rate of snap-fits.
In this study, a cantilever snap-fit model was prepared using HyperMesh and analyzed
with OptiStruct. It was determined that the insertion force was too large and that the
extraction force was too small (in this case the force targets were arbitrary). Next,
design optimization was performed on the model to achieve the desired insertion and
extraction forces. HyperStudy was used to systematically generate several variations
of the nominal design and test them to determine the optimal design.

3 Problem Identification

The snap-fits contain interconnecting locking features which help in assembling and
disassembling along with locating features for proper alignment. The elastic
deflection and retention of the mating parts are responsible for confining the motion
between the mating portion in the assembly direction [3]. The design aspects of snap-
fit components affect the intensity of the retrieval force required. The different
applications of snap-fit calls for different retrieval forces.

4 Design

If the exact forces are not yet known while designing the model, to set the appropriate
values for the dimensions, most commonly the deflection and strain values are used
rather than force and stress values. The dimension values will be depending on the
maximum strain during deflection and not on the force required to assemble or
disassemble.
So we go for simulation of standard cantilever snap-fit component where we
understood the region of maximum stress and deflection. The design of snap-fit
changes as space and deformation constraints will be there depending on the
application.
The analysis of snap-fit can be done as follows:
The snap-fit is treated as a cantilever beam (the same as the designing of gear tooth).
The perpendicular component P causes the bending moment about the base of the
cantilever. Just like the Lewis equation for gear tooth, the following assumptions are
imposed on the snap cantilever.

ISBN :978-81-945631-7-4

77
1. The component of force along the axial direction of the cantilever is assumed to be
negligible.
2. The direction of the force which causes bending of the beam is assumed to be fixed
and acting perpendicular to the axis of the cantilever.
3. The effect of stress concentration is neglected[10].

Fig. 1. Simply supported cantilever snap-fit subjected to perpendicular load.

At the base section,


Mb = P × l ,
𝐵𝑡 3
I= and y = t/2,
12
The bending stresses are given by,
𝑀×𝑦 (𝑃×𝑙)(t/2)
σb = = 𝐵𝑡3
𝐼
12
Rearranging the terms,
𝑡2
P = 𝑏 × σ( ) .......... Beam strength equation [10] for snap-fit for a single snap.
6𝑙
for multiple snaps,
𝑡2
P = 𝑛 × 𝑏 × σ( ) .......n= number of snaps.
6𝑙
Thus mating force is calculated by,
𝜇+𝑡𝑎𝑛𝛼
W = 𝑃( )
1−𝜇 𝑡𝑎𝑛𝛼
Where,
l= Beam length,
b= width of the cantilever,
t= Thickness of cantilever,
I=Moment of inertia,
Mb =Bending moment,
µ =Coefficient of friction,
α= Lead or return angle.

ISBN :978-81-945631-7-4

78
5 Scope for the variation in the Design

Fig. 2. Geometrical features of Simply supported cantilever snap-fit.

1.Assembling/Insertion angle (α): Generally kept minimum so the force for


insertion is minimal. The too low angle may reduce the life of the tip and reduces
the strength. As the angle increases the force required for mating will be increased.
2.Disassembling angle (α'): Increase in disassembling angle increasing the
retrieving force. The 900 angle gives permanent joint between two mating snap fits.
The interlocking feature depends on this angle.
3.Length of the cantilever (l): As the length increases, bending tendency
increases and thus stiffness reduces.
4.Thickness (t) and Width (b): More values give more resisting area thus more
strength. The stiffness increases and thus increasing the retrieving force.

6 Advantages

1. Saves time.
2. Reduced manufacturing cost in production by reducing material costs.
3. A great way for companies to reduce their part assembly costs.
4. Using snaps in place of mechanical fasteners can save costs in material and
labor.
5. Reduces administrative costs and costs associated with warehouse space by
reducing the number of components in an assembly to be managed.
6. Improves ease of assembly.

7 Disadvantages

1. The addition of snaps into the part design will likely increase the tooling cost and
lead time due to increased complexities to the mold.
2. May not provide as strong of a retention force between two components as a
mechanical fastener (screw, nut, bolt) would provide.

ISBN :978-81-945631-7-4

79
8 Conclusion

1. Depending on the application, the insertion, as well as retention force values for
cantilever snap-fit, can be changed. They are the functions of geometric features.
2. The optimization in design with proper consideration leads saving of material
and improved productivity.

Acknowledgment
The authors acknowledge the infrastructure and support of Walchand College of
Engineering, Sangli.

References

[1] N. Vidakis, M. Petousis, and S. Konstantinos, "Experimental Determination


of Fused Deposition Modelling Parts Compressive Strength", Journal of
Computational Design and Engineering, Mechanical Engineering
Department Technological Educational Institute of Crete Heraklion, Crete
71500, Greece (2017).
[2] C. Klahn, D. Singer, M. Meboldtb, "Design Guidelines for Additive
Manufactured Snap-Fit Joints", 26th CIRP Design Conference, Procedia
CIRP 50, 264-269, Switzerland (2016).
[3] E. A. Ramírez, F. Caicedo, J. Hurel, C. G. Helguero, J. L. Amaya,
"Methodology for the design process of a snap-fit joint made by additive
manufacturing", 12th CIRP Conference on Intelligent Computation in
Manufacturing Engineering, Procedia CIRP 79,113-118, Gulf of Naples,
Italy (2018).
[4] W. Liu, H. Song, Z. Wang, J. Wang, C. Huang, "Improving Mechanical
Performance of Fused Deposition Modeling lattice structure by a Snap
Fitting Method", Materials and Design 181-108065 (2019).
[5] J. L. Amaya, E. A. Ramirez, M. Galarza F.and J. Hurel, "Detailed Design
process and assembly considerations for snap-fit joints using additive
manufacturing", 29th CIRP Design 2019, Procedia CIRP 84, 680-687 (2019).
[6] R. Hernandez, D. Slaughter, D. Whaley, J. Tate, and B. Asiabanpour,
"Analyzing the Tensile, Compressive, and Flexural Properties of 3D Printed
ABS P430 Plastic Based on Printing Orientation using Fused Deposition
Modeling" Proceedings of the 27th Annual International Solid Freeform
Fabrication Symposium- An Additive Manufacturing Conference Reviewed
Paper, (2016).
[7] E. Whalen and R. Kodwani, "Snap-Fit Optimization for Achieving Desired
Insertion and Retention Forces", Altair Engineering Inc. Revised 6/25/2018.
[8] Handbook of "Snap-Fit Design", R&D Centre, Korea Engineering Plastics
Co., LTD.
[9] Handbook of "Tensile Testing of Plastics", Plastics Technology
Laboratories.
[10] Reference Book of "Design of Machine Elements", by V. B. Bhandari.

ISBN :978-81-945631-7-4

80
COMPARATIVE STUDY OF EDGES OF THERMAL
IMAGES USING GRADIENT, LAPLACIAN, CANNY
OPERATORS: A Critical Review

Srishti Tiwari [0000-1111-2222-3333],


Sameeksha Choubey [1111-2222-3333-4444],
Prof. M.P. Parsai[2222-3333-4444-5555]

1 Research Scholar,Dept. of E&Tc Engineering, JEC Jabalpur (M.P.), India


2 Research Scholar, Dept. of E&Tc Engineering, JEC Jabalpur (M.P.), India
3 Professor, Dept. of E&Tc Engineering, JEC Jabalpur (M.P.), India

Abstract. The action of alteration of induction heat into distinguishable


illustrations (image) for the perception of traits in scarcity of ocular light
is termed as thermal imagery. In order to gain meaningful data, the im-
ages must undergo a series of pre-processing steps that include: edge de-
tection. In general kernel based methods like Sobel , Canny, Roberts etc.
are used. This paper presents an overview of the current trends for edge
detection. Canny contrivance has indicatives like tremendous compe-
tence, commotion subduing, and extensive details of extremities (bound-
aries or edge). The incentives behind this assessment are to implement
the state of art with reference to exertive induction heat thermography for
perception and indication of various utilizations.

Keywords: OR,IH,AZ,UC,Sobel Operator,Prewitt Operator.

1 INTRODUCTION

Thermal imaging is ingenuously the technique of transmuting IR emission to detecta-


ble form that characterize the dimensional dissemination of warmth variance in the
arena observed through thermic camcorders..IR strength encompassing us aforetime
and is comprehensively self reliant of the amount of detectable lustrous attainable.
Thermal Imaging works by observing and then representing corresponding disparity
in the IR being emitted from the body. Because induction heat model generate model
through variation in torridity, because whatever generate heat can be distin-guished
and depicted. For instance creature, crowd, electromechanical have disinc-tive heat
signatures that will detectable through thermic camcorders.

ISBN :978-81-945631-7-4

81
2 IMPLICATION OF IH IMAGERY

The induction heat imagery foremost perceives, furthermore exhibits the distinctions in
heat energy. It, later on, based on those heat distinctions creates hued or GS illus-tra-
tions. IH energy may be a segment of gamut, however, it owns wavelengths that can
not be examined via human scrutiny.As a result, it is doable to use IH imagery with
regards to image formation whilst not exploiting any actinic ray.This allows them to
choose informed little temperature variations in obscurity, along with precise weather-
related traits like dust, smog, etc.All the objects in the universe correspond to certain
heat traits hence possess some amount of IH emissions always. In fact, per certain the-
ories and researches, anything and everything beyond the AZ (the temper-ature at
which all sorts of atomic activities cease completely) radiate a certain amount of IH
and these emissions can be trapped via suitable IR capturing devic-es(cameras) within
the optimal state of affairs. The extent of IH emissivity is directly proportional to the
torridness of a body(object).

3 FUNCTIONING OF INFRA-RED (IR) IMAGING

Humanistic prospects are able to perceive the target(image) that are lit up by sunlight or
another form of light at peculiar intuition in the viewable visional range. In contrary to
this IR camcorders detect warmth radiate by objects. IR radiation is an EM emission of
tiny molecules called photons.
Every objects at temperatures beyond utter zero (-273°C or -459.69°F) transmit crimson
emission, and that is why transmission and observation is transferred and detected by IR
(thermal) cameras. This is why a thermal camera can operate even in complete darkness.

3.1 Classification of IR Imaging:-

IR Images are classified on the basis of two mentioned criteria:-

IR IMAGING

UC- The Detector and CC- Its more of a Distributive


The Battery are all confined Unit But much more Effective
in single Block

ISBN :978-81-945631-7-4

82
Figure 1. Classification Of IR Imaging

3.2 Uses of IR Imaging


i. Surveillance in security, law enforcement and defence
ii. Thermal Imaging in medical sciences and veterinary
iii. Drone Surveillance for UAV[8]

4 TECHNIQUES INCORPORATED FOR PERCENTION OF


(EDGES)

The extremities, boundaries or edges in all sorts of images correspond to the varia-tions
in ocular potency. In order to examine these extremities, disruptions in luminosi-ty is
observed. The perception of extremities of images is incorporated via image segmenta-
tion and information extraction in various scientific and research related assignments.
It is of utmost relevance to us to observe the extremities because most of the information
in IH technology is contained in them and extracting merely the boundaries enables us
to have a great extent of pros like memory economiz-ing.[2][6][11]

4.1 Canny Method

This is the ultimate effectual modus operandi. The clever approach contradictory to
threshold exposure. This method practise two absolutely distinctive inception (to re-
mark vigorous and fragile threshold) and encompass the vigorous edges in the product
given that they dete-tion process in that it utilizes 2 entirely separate thresholds (to
note hard and weak edges) and incorporates weak edges in the performance because
they are related to solid edges. This technique is less likely to be rigid than the others.
In certain instances, the simulation of a Dual Dimension Gaussia is expen-sive, and it
is proximateby two dimensional Gaussians, one in the x vein and another in the y vein.

There are two Steps by which Canny Detection Works:-

ISBN :978-81-945631-7-4

83
i. Nonmaximum eradction:
Edg-es may happen at the most points of the gradient. Consequently, not all references
can be omitted at the limit. In terms of trying to do so, each picture dimension is deter-
mined on the amplitude and orientation of the slope Instead, for each image fea-ture,
test whether the amplitude of the slope is greater at a distance of one pixel in either the
positive or the negative direction right angles to the gradient. If not wider than any
picture aspect, eliminate it.

ii. Edge Threshing:

The threshing process used by the Canny Edge Detector is referred to as "per-
turbation." Almost everyone uses a substantial threshold and an occasional
threshold. If a function contains a value at the top of a massive level it is set
as a specific item. If the feature has a value at the apex of the low threshold
and is the neighbor of the simple function, it's the same.[4][2]

Figure 2:- Output of Canny Operator

4.2 Sobel Method

The SO perceives image extremities by scheming the image potency's gradient values
at per-capita pel(picture element) not beyond the illustration. It schemes along with the
guidance of the most vital increment from lightweight towards opacity, henceforth the
perception in a particular direction. The outputs predict however suddenly or swim-
mingly the image varies at every pel. As the aftermath based on the luminosity of re-
spective pel depicts after what precedent the extremities are guided.[8].

ISBN :978-81-945631-7-4

84
These TK are formulated to reply superlatively to extremities operating
transversely and longitudinally wrt the component grid, 1 TK is allotted
corresponding to the 2 perpendicular prescriptions. Both of the above
mentioned TK are enforced in succession to the input illustrations to con-
tribute disjoint assessment of the gradient part in every prescription (re-
ferred to as Sx and Sy). The above mentioned will then be united to ci-
pher the utter significance of gradient for entire prospects and also the
angular adaptation corresponding to the gradient [3]. ]. The gradient signifi-
cance is accustomed as:

|S| =√(SX)2 + (Sy)2


Ordinarily, a rough significance is ciphered as:

|S|=|Sx| + |Sy| …(1)

which is much quicker to cipher .The angular adaptation of the edge (extremities rela-
tive to the pel grid) gives surge to dimensional gradient is ciphered as:

Θ = tan-1(Sy\Sx) [11] … (2)

Figure 3 : - Output of Sobel Operator

4.3 Roberts Method :

The operant of Roberts contrivance an agile and mere, conducive to discern 2D


reckoning of temporal gradients on the depiction(image).In that same way, it depicts
regions via a high spatial gradient that often contributes to edges. The refutation for the
converter might be a grayscale picture even in its traditional form, much like the

ISBN :978-81-945631-7-4

85
performance. The pixel values are the measured magnitude of the spatial gradient of
the input value at that time for some reason inside the image.

1 0 0 1

0 -1 -1 0

Sx Sy

Such TK is square measures designed to revert to the edges operating at a distance of


45 ° to the constitutive grid, one kernel for each of the 2 perpendicular orientations.
The kernels will be added one by one to the input point, to provide different measure-
ments of the gradient element in each orientation (call them Sx and Sy). Such will
then be compared to calculate the absolute magnitude of the gradient element in each
orientation. The gradient significance is accustomed as:

|S| =√(SX)2 + (Sy)2

Ordinarily, a rough significance is ciphered as

|S|=|Sx| + |Sy| …. (3)

which is much faster to compute.


The angle of orientation of the sting (relative to the constituent grid) giving rise to the
spatial gradient is given by:

Θ = tan-1(Sy\Sx) - 3π/4 [2] …. (4)

ISBN :978-81-945631-7-4

86
Figure 4: Output of Robert Operator

4.4 Prewitt Method :

PO is employed for extremities perception in a depiction(image). It perceives 2 forms


of extremities longitudinal & transverse ones.
Extremities space of influence per entity ciphered by profiteering contrast amidst anal-
ogous pel ferocity of a depiction. All the operators in that space of influence per entity
used for extremities perception also are cited as repercussion operators. Considering
that image depictions are merely an implication, henceforth variations in a striking sig-
nal will single-handedly be ciphered via profiteering(exploitation) differentiation.This
is the vital cause behind these operators to be referred to as derivative operators or
derivative masks[8].
All the repercussion operators ought to have these posterior characteristics:

I. Contrary operators should be existent in the operator.


II. The aggregate of the operator must be equivalent to nil.
III. Higher density indicates higher extremities perception.

PO has following TK that is formulated to reply superlatively to extremities operating


transversely and longitudinally wrt the component grid, 1 TK is allotted corresponding
to the 2 perpendicular prescriptions

-1 0 1 1 1 1
-1 0 1 0 0 0

-1 0 1 -1 -1 -1

Sx Sy

The above mentioned will then be united in order to cipher the utter significance of
gradient for entire prospects and also the angular adaptation corresponding to the gra-
dient . The gradient significance is accustomed as

|S| =√(SX)2 + (Sy)2 ………………..…. (5)

Ordinarily, a rough significance is ciphered as:

|S|=|Sx| + |Sy| …………………….(6)

ISBN :978-81-945631-7-4

87
which is much quicker to cipher .The angular adaptation of the edge (extremities rela-
tive to the pel grid) gives surge to dimensional gradient is ciphered as:

Θ = tan-1(Sy\Sx) [9] ……………………..(7)

Figure 5. Output Of Prewitt Operator

4.5 Laplacian Method


Laplacian Operator is furthermore a bounce-off operator that is deployed to look for
corners in an image. The key difference between Laplacian and other operators such
as Prewitt, Sobel, and Roberts are that these are all areas of unit 1st order bounce-off
masks but Laplacian can be a second-order bounce-off mask. In this mask, we have
two other classifications one is Positive(for ciphering the apparent extremities) whilst
a Negative(for ciphering the inbound extremities).

The Laplacian L(m,n) of an illustration with an aspect intensity value of I(m,n) is ci-
phered

L(m,n)= (8)

It uses a hybrid filter that is a concoction of gaussian and laplacian convolution filters
The three kernels used are estimated second derivatives, which are typi-
cally low and very reverberation sensitive.

0 1 0 1 1 1 -1 2 -1
1 -4 1 1 8 1 2 -4 2
0 1 0 1 1 1 -1 2 -1

ISBN :978-81-945631-7-4

88
As seen in the illustration applying the log operator to the image, the edge of the image
can be identified with the aid of these three kernels.
The preprocessing stage decreases low wavelength noise aspect until differentiation
here convolution is associative so we have a preference to convolute mathematical
smoothing filter with laplacian filter. So there are two benefits, due to small kernels,
fewer arithmetic operations are needed and LOG operator kernel is pre-calculated so it
is necessary to evaluate at runtime.[2]

4.6 LOG(Laplacian Of Gaussian) Method:-

The LOG extremities perception operator was quite a vital technique (before Canny).
It's also a gradient-based operator that operates in two extensive treads; formerly the
pertinence of a Gaussian filter abolishes the commotions in the image signal subse-
quently the Laplacian operator recognizes the acute extremities in it by administering
the double derivative methodology. It employs on zero-crossing methodology. The
Gaussian operant is designated by the principle of operation :-

G (m, n) =
……………………(9)

Where, s is standard deviation, and m and n being the rows and columns

LOG =
+ ……..(10)

Figure 6. Figure Showing LOG Feedback

ISBN :978-81-945631-7-4

89
S.NO. OPERANT TURBULENCE MISLEADING
SUBTILITY EXTREMITIES
SPACE

TIME
1 SOBEL MINOR MAJOR FEWER MAXIMUM
2 CANNY MINOR MAJOR FEWER MINIMUM
3 ROBERT MINOR MAJOR SUBTILITY MAXIMUM
4 PREWITT MAJOR MINOR FEWER MAXIMUM
5 ZERO MINOR FEWER MAXIMUM
CROSSINGS MAJOR

5 EXECUTION FRAMEWORK :-

Figure 7. Proposed Algorithm

ISBN :978-81-945631-7-4

90
5.1 Moderated Square Error:-

Moderated Square Error(MoSE) of illustration(signal) is ciphered by applying the


moderate of error squared.This glitches related estimations are concluded by gather-
ing the contrasts betwixt the classical and predicted outcomes
.
MoSE = ∑ …………………………… (11)
here f(x , y) is the classical IH illustration while F(x ,y ) is the predicted IH illustration
of the intensity K*K

5.2 Crest Indication to Commotion Propotion (CICP):-

CICP is attained by ciphering the proportion amongst ultimate indicator strength to


the commotion strength that alters the fidelity of the illustrations under interest. The
CICP is ciphered as

CICP = 20 log10 (MAX/MSE) ……………………………(12)

5.3 Operator Ratio:-

Operator ratio can be defined as the ratio between untreated thermal image sizeto the
treated thermal image size.
OR = untreated thermal image size/treated thermal image size ………. (13)

All the three parameters mentioned above depict the comparative performance of the
respective operators incorporated.[3]

ISBN :978-81-945631-7-4

91
ISBN :978-81-945631-7-4

92
Fig . (a) Comparison Chart
(b) Moon Surface Imaging Chart Obtained from NASA
(c) O/P Image (I) of All Operators.
(d)O/P Image (II) of All Operators

6 CONCLUSION

This paper explains the specific edge detection confronts for thermal imaging and pro-
vides the nuance needed to understand the principle of edge detection methods. This

ISBN :978-81-945631-7-4

93
analysis outlined the various methodologies that employ efficient IH thermography an-
alytical techniques for extremities perception that is currently being reviewed and im-
plemented in specific science fields, checked their feasibility and utility, and proposed
that depending upon the application areas of IH illustrations, the precision of different
operators changes. Henceforth we need to study more about laplacian filters as they can
deliver promising results too. Present development in IH imaging systems is also sug-
gested here. For the future, we are preparing to integrate several approaches and to
adjust their respective thresholds to reduce the fallacies.

OPERATOR ASSETS DETRIMENTS


Serenity of Enactment, Commotion Subtility,
Classical Extremities Percep- In-accuracy in extremi-
(Sobel,Prewitt,Rob- tion and Their Align- ties,
erts) ment Boundaries

Zero Crossings Extremities Dis- Respective to Pre Exit-


(Laplacian, LOG) clousure, ing Extremities,
And their Allignment Noise Subtility
Well Defined and Omni
Directional Properties
Utilization Of Proba- Futile Intricate Data,
Gaussian blity Theory for the cal- Erroneous Zero Cross-
(Canny) culation of Error Rate ing, Stagnant
Localization and Re-
sponsive, better
SNR,Evolved Detection
in Noisy Environment

REFRENCES

[1] Bryan F. Jones:”AReppraisal of the Use of Infrared Thermal Image Analysis in


Medicine”
[2]Dr. Krishna Raj,Pragya Gautam,Kapil Dev Tiwari,Vipul Goel:A Review Paper: On
Various Edge Detection Techniques
[3] EhsanNadernejad,SaraSharifzadeh :”Edge Detection Techniques : Evaluation and
Comparison”.
[4] .inf.ed.ac.uk
[5] Jin-Yu Zhang, Xiang-Bing Meng,Wei Zhang, Sheng-Jietao:” A novel algorithm for
reconstruction of infrared thermographic sequence based on image segmentation”

ISBN :978-81-945631-7-4

94
[6]Kunal J Pithadiya”Combination of thresholding and Log Edge Detection Technique
in Thermal Image Analysis”.
[7] Mohammad S. Alam, senior member IEEE, John G. Bognar, Russell C. Hardie,
Brian J. Yasuda: “Infrared Image Registration and High Resolution Reconstruction Us-
ing Multiple Translationally Shifted Aliased Video Frames.
[8] MrityunjayRai, TanmoyMaity, R.K. Yadav: “Therma imaging system and its real
time application: a survey”
[9] RamanMaini, Dr.HimanshuAgrawal :”Study and Comparison of Various Image
Edge Detection Techniques”.
[10].Shazia Shaikh,Ramesh Manza,Nazneen Akhter:”Current Trends in the Applica-
tion of Thermal Imaging in Medical Condition Analysis”
[11] SK Katiyar, PV Arun :” Comparative analysis of common edge detection tech-
niques in context of object extraction”.
[12] Xiaohui Chen, GuangtaoZhai, Jiawang, Chunjia Hu, YuanchunChen:”Color
Guided Thermal Image Super Resolution”

ISBN :978-81-945631-7-4

95
Scope of BIM Application forMunicipalSolid Waste
Management

Gaurav S. Narlawar 1 and Dr. P. G. Sonavane 2


1 Research Scholar, Walchand College of Engineering, Sangli, Maharashtra
2 Professor, Walchand College of Engineering, Sangli, Maharashtra

gaurav.narlawar@walchandsangli.ac.in
pratap.sonavane@walchandsangli.ac.in

Abstract:The Municipal Solid Waste Management (MSWM)involves techno-


logical proficiencieswithproper strategy, coordination and techniques facilitat-
ing decision making to choose sustainable waste disposal technology for sus-
ceptible parameters. Building Information Modelling (BIM) is extensivelyprac-
ticedin the current eraoftechnicaladvancement in the construction sector. Now-
adays, clients as well as construction firms believe that they can better under-
stand the more detailed information with BIM applications. BIM integrates var-
ious aspects with appropriate coordination, assesses the configurability of the
project framework, determines time and cost of project, creates a broad picture
of projects through modeling and builds a collaborative unit. In this paper,
scope for applicationof BIM is explained and the principle of BIM is attempted
to illuminateinvestigating the imminentopportunity in MSWM.

Keywords:Building Information Modelling (BIM), Construction Waste Man-


agement,Dimensions of BIM,Project Management,Municipal Solid Waste
Management (MSWM).

1 Introduction

Most nations with effective technological implementations develop their technologies


based on local environments, competencies and resources. The introduction of tech-
nology under no circumstances resolves the waste management problem, since the
planning should take into account local circumstances, resources and opportunities.
The emergingnations are working with difficultiesassociatedwithstrategy for waste,
selection of waste technology, and the convenience of practicallyskilledworkforces in
the waste management sector, ensuingmeager management of waste and the associat-
ed wellness of populace and ecological implications.MSWM must be addressed in a
comprehensive and unified way, not only through the adoption of technologies neces-
sitating suitable scheduling, implementation and controlling, backed up with detailed
information processing, is a move that should be seriously considered.
The globally acknowledged concept, BIM is commonly intended for defining anas-
sembly of parameters for methods and tools for creating and maintaining a unified
multidimensional database for interacting with information on building design, con-

ISBN :978-81-945631-7-4

96
struction and operation. It improves collaboration among stakeholders, document
projects, and reduces the time required to achieve more predictable project results.
One can use the BIM model to view the entire project life cycle. BIM model consist
of computer models that comprise of lines, points, and geometric objects. These ob-
jects carry all the information associated with the project and can be used and modi-
fied all through the project life cycle. They include their physical and practical fea-
tures along with project life-cycle data, from initial concept design to construction,
and finally through facility operation and maintenance.Recently, the researchersare
concentrating on BIM applications in different sectors.

2 Building Information Modelling (BIM)

2.1 Definition of BIM

The Building Information Modeling Handbook defines BIM, "a digitalvisualization


technique for developing and monitoring information of building through associated
practices of developing, collaborating&analyzingdata of building model.”

The National Building Information Modeling Standardscommissionof


U.S.delineates BIM, “A virtualillustration of a functional and operational characteris-
ticof the facility. BIM is collective information platform ofacquaintance about the
facility that provides a viableplatformaimed at decision making throughout its life,
viz. from preliminary design to final demolition.A fundamental principle of BIM is an
involvement of several authorities at various stages ofthe facility lifecycle to add,
remove, alter or upgrade details in BIM for reinforcingas well asimposing theduties of
theparticipant.”

Fig 1: Building Information Modelling (BIM)[Source: Autodesk]

ISBN :978-81-945631-7-4

97
2.2 Different BIM Dimensions

The dimensions of BIM can be categorized from BIM 3D to BIM 8D based on data-
base content.

▪ BIM 3D [3D Visualization]

A 3D model is signifying length, breadth and height of construction building. BIM


tools often include functions for 3D presentations as textures, lightning, and view
ports.

▪ BIM 4D [Time Scheduling]

A 4D BIM represents BIM 3D model expanded with an additional variable i.e.


time. A traditional planning is substituted usingthe parametric modelling where each
element is specified in assembly order to 3D model. The 4D BIM offerspractices for
managing and envisioning site situation i.e. site info, modification effects along with
supporting communication in several circumstances such as advising site staff or
warning about hazards[1].

▪ BIM 5D [Cost Estimating]

A 5D BIM signifies BIM 4D model expanded with additional variable as material


and labor cost i.e. 4D + cost. In 5D, the model consists of designs, take-offs, amounts
and dimensions that can be obtained unswervingly from the basic 3D model. BIM 5D
provides quick cost estimation of abstract designs and involves precise quantification
of material from 3D model. BIM 5D is useful for easy comparison of completion time
and overall costs of different substitutes from technology and materials point of view,
so that it helps in optimizing overall cost of the project[1].

▪ BIM 6D [Sustainability]

A 6D BIM helps executeenergy demand analyses with compatible software for da-
ta integration associated with energy consumption or environment protection. The
application of BIM 6D technology can contributetoincreasingly fair and correct ener-
gy estimations early in the planningstage. BIM 6D Models are frequently used as a
prime means to satisfy requirements specified by Leadership in Energy and Environ-
mental Design (LEED) andBuilding Research Establishment Environmental Assess-
ment Methodology (BREEAM)[1].

▪ BIM 7D [Facility Management]

A 7D-BIM is advantageous for superintendents in the operation and maintenance


of the facilityover the whole useful life of the project.Facility managers are liable for
operating and maintaining the structures during their service period. The complete

ISBN :978-81-945631-7-4

98
information of every specific element such as building, finish, equipment, etc. should
be added in the database. The related information of the facility operation and
maintenance are item type, item specification, replacement or next maintenance time,
period of warranty, etc. 7D-BIM allows you to suitably maintain the building and in
case of failure, it can urgently find and repair items[1].

▪ BIM 8D [Safety]

An 8D BIM takes safety into account i.e. how well the structure can deal in the
event of a natural or man-made disaster, the essential safety measures and damage
minimization plans. 8D BIM might include fire exits, evacuation plans, escape routes,
etc. By reviewing and removing risk factors, 8D BIM can be adopted to prevent dan-
gers in the area under construction.

3 Literature Review

The literatures of BIM by several researchers are discussed evaluating thescope for
introductionof BIM in the areaof MSWM as follows.

3.1 Building Information Modelling

3.1.1 Concept of BIM

The growing popularity of BIM frameworkpromotestheimplication ineachphasesof


the construction endeavors lifecycle.Azhar [2]exemplified BIM concepts, advantages,
possible threats and imminent challenges in the constructionindustry. The findings
showed that there was significant aggregate BIM return on investmentfor construction
projects that strongly suggests the potential cost-effective benefits.Arunkumar et al.
[3]illustrated the advantages of BIM implementation and difficulties to its application.
It aimed to understand the mindset of practitioners about the optimistic and pessi-
misticparameters that influence the applicationof BIM in the construction industry. It
was stated that although procurement cost and training costs were identified as major
challenges, cost savings through proper BIM implementation will be higher compared
to initial investment costs.
The preferable evaluations ofbenefits, obstacles and threats of BIM confirm that
projects are efficiently performed and contribute through motivating professionals to
take competent decisions that facilitate time savings and costrelated expenditure in the
paradigm shift from computer-aided design (CAD) to BIM.Chang et al.
[4]appreciated importance of BIM with the parameters such as development of a
functional BIM project execution strategy, defining BIM provisions, specifying level
of developmentandreporting the whole lifecycle of construction project. Seyis
[5]investigated the strengths and weaknesses of BIM in the paradigm shift from CAD
to highlight the advantages, challenges and risks of BIM.It supported the existing

ISBN :978-81-945631-7-4

99
BIM knowledge base by offering detailed description and categorization of ad-
vantages, risks andchallenges of BIM and prioritizing advantages of BIM with respect
to time, cost and sustainability along with risks and challenges of BIM.

3.1.2 Project Management with BIM

Considering BIM as an important initiator for successful implementation, project


leaders must learn well enough to integrate into the policies which can be used for
success.Fazli et al. [6]analyzed the application of BIM as a powerful medium to mod-
el the project site in order to minimize potential effort with reduction of time and
cost.The research revealed that the performance of BIM applications is usually diffi-
cult for project managers due to lack of expertise.BIM helps project managers to suc-
cessfully complete tasks and provides better decision-making framework relative to
conventional approaches.Rokooei [7]exemplified the importance of BIM & project
manager responsibilities in construction projects and the BIM knowledge and experi-
ence prerequisites of the project manager. The findings indicate thatBIM can be con-
sidered a strategic framework, not so much a technological platform for construc-
tion.Franz and Messner [8] examined the effect of BIM implementation on project
reliability and BIM execution planningon performance of projectalong scope of pro-
ject organization approach. It was detected that a significant positive result of practi-
calBIM implementation on unit cost of construction, production rate, anticipated fa-
cility standard, and collective synergy in the executive management when monitoring
for project intricacy.

3.1.3 Applicationsof BIM

The current upsurge of the construction industry has been encouraging a significant
increase in BIM implementations focused primarily on planning and develop-
ment.Bryde et al. [9]explored the extent of BIM application with reported benefits to
the construction projects developed with BIM. It was evaluated that the most of-
tenobservedadvantage associated with the reduction of cost, monitoring throughout
the life cycle of the project and potential time savings.Migilinskas et al.
[10]contemplated the phases and patterns in the advancement of BIM frameworkand
made recommendations for future BIM applications. It was found that BIM expertise
and applications are emergingrapidly.There is a necessity to ensure an acceptable
standard of compliance and optimization of functional activities for project associates
and participants for a more satisfactory implementation of BIM.
The adoption of BIM frameworks for the process of operation and inspections has
not been so broadened.Shou et al. [11]explored the level of extent of BIM implemen-
tation thriven in building and infrastructure industries. It illustrated support for new
BIM use, improved conventional project management and project delivery process
transformation.Guillen et al. [12]introduced the implementation of BIM frameworks
as a critical component to facilitate successful enactment of the asset management
information system. It was concluded that BIM benefits for asset management are not

ISBN :978-81-945631-7-4

100
well characterized. It perceived the requisite of the knowledge extension on asset
management endorsed with the BIM framework as the basis for an information sys-
tem for asset management.

3.1.4 Construction Waste Management with BIM

BIM can control construction and demolition waste efficiently by minimizing diffi-
cultiesthrough design alterations and modifications to improve building design and
building processes.Liu et al. [13]checked a unified platform to design decision-
making on waste, by supplying well-versed information of the model-oriented build-
ing to report the causes of waste throughout the design stages. They reported that the
BIM use in the projects is significant to ensure high design quality and to gain infor-
mation on the positive effects of the operations on the development of construction
waste on the site.Won and Cheng [14] identified BIM's potential opportunities for
effective construction and demolition waste management and reduction during the
preparation, designing, construction and dismantlingstages of construction projects.
As BIM-based approach focuses on changes in the process involving various types of
project members, the disposal of construction and demolition waste requires definite
cooperation among members based on enhanced communication between project
members. BIM-based process maps contain information about people involved in the
construction and demolition management process, as well as information that need to
be created and exchanged among project members.Kim et al.[15]mentioned a para-
digm based on the BIM that evaluates demolition waste in the initial stages of design
to attain efficient and optimized scheduling, supervision, and management. They de-
veloped a framework for assessing the quantity and categories of demolition waste-
formed during the building’s demolition phase with BIM, start from design phase and
governed by define standards of the country. The study assist as an assessment tool
for the demolition waste in the demolition stage and offer tools for calculating demo-
lition waste disposal fees, pickup ratings, recycling process and environmental impact
assessments with addition of correction factors.

3.2 Municipal Solid Waste Management in India

In order to minimize the detrimental effect on environmental sources,implementation


of practical methodologies for current and potential populations is urgently required.
MSWM must be taken into consideration in an organized approach quantitatively
with the application of technology with adequate preparation, execution and tracking,
assisted by accurate statistics.Srivastava et al. [16]studied the challenges and opportu-
nities confrontedinurbanite solid waste management in emerging countries for in-
stance India. It was investigated that the solid waste disposal deprived ofappropriate
treatment has a negative impact on various environmental components (soil, water
and air), socialwell-being and interpretative importance. It was concluded that once
Municipal Solid Waste (MSW) is managed effectively, it mitigates adverse impacts
and can satisfy environmental and economic demand.Joshi and Ahmed [17] analyzed

ISBN :978-81-945631-7-4

101
status and barriers of MSWM in India. The prime parameters of MSWM along with
anall-inclusiveappraisal of MSWproduction, its characterization, collection and man-
agement as performed in India were evaluated. It was concluded that the construction
of decentralized waste processing systems in urbanitemetropolises or townships and
the innovation of the organized recyclingsector is required in developing countries
like India.Sharma and Jain [18] overviewed the generation, composition and treat-
ment of MSW in India.It was observed that in 2015, metropolitanregions of Indiapro-
ducedMSW which is around 62 MT.Almost 82 percent of MSWwaspicked upand the
residual 18 percent was dumbed. Only 28% of the waste picked up was treated and
the remaining 72% was exposed to dumps.It was concluded that rapidcivicdevelop-
ment, tradeexpansion, expandingpopulation and monetarygrowth have caused a sub-
stantialincrease in production of waste in India. In India, MSWMsys-
temappearsincompatiblebecause ofthedependence on insufficient waste services, un-
organizedprovince and opendumping of waste. In order to manage foremostproblems
associated with waste management, effective waste policies, appropriatetech-
nicaldevelopments and adequacy of skilledpersons are necessitated.
The researchers of emergentrepublicsrequire to encourage evolvinginventive and
demandingadvance investigation projects to promotepracticable, operative and envi-
ronmental solid waste management methods. Priti and Mandal [19]reviewed practic-
es, challenges and policy implications in the evolution of MSWM in India. The com-
position of MSW was found massively influenced i.e. 45 to 50 percent with organic
waste, posing a technology adoption challenge. It was summarized that India requires
to develop and build a well-organizedMSWM system with adequate incentive pro-
grams and provisions on business model that are both socially acceptable and sustain-
able. Das et al. [20]overviewed a wide range of existing solid waste management
strategies such as composting approaches, energy recovery technologies which in-
cludes thermo-chemical conversion and bio-chemical conversion. It described various
innovative solutions reported in many nations for accomplishing smart and resilient
waste management policies. The research revealed that an enhanced approach to the
convergence of societal, financial, administrative, legal, technological and ecological
aspects necessitate for an effective solid wastemanagement. Thetopographicalloca-
tions and financialposition of countriesare crucial factors in regulating the properties
of waste. It was concluded that the performance for solid waste management mecha-
nisms must be assessed on the basis of their long-term economic viability which
would make it easier for managers to manage the ever-increasing size of solid waste
in a more flexible manner.

4 Conclusion

The literature assessment reveals that several researchers have made all-
embracinginvestigation on BIM implementationin various areas such as construction
project management, extraction of features, system modelling, economic sys-
tem,construction waste management, etc.BIM provides benefits to construction con-
tributors including the improved efficiency with BIM coordination, fundamental

ISBN :978-81-945631-7-4

102
model frameworks, simulation, budget estimating, clashes identification, schedule
tracking, planning, sustainability analytics, quantitative energy analysis, productivity
optimization, significantly improved technologies, fast delivery of projects, improved
client support, earlier error mitigation in design phase andupgraded safety measures.
Inclusively BIM supports for minimizing man hours in quantity takeoff, increasing
efficiency, forecasting imminent issues, early decision making, etc.Accordingly, there
entailfurtherresearchon BIMimplementation inMSWM.

References

[1] I. Czmoch and A. Pekala, “Traditional Design versus BIM Based


Design,”Procedia Eng., vol. 91, pp. 210–215, 2014.
[2] S. Azhar,“Building Information Modeling (BIM): Trends, Benefits, Risks,
and Challenges for the AEC Industry,” Leadership Manage. Eng.,vol. 11, no.
3, pp. 241–252, 2011.
[3] S. Arunkumar,V. Suveetha, and A. Ramesh, “A feasibility study on the
implementation of building information modeling (BIM): from the
architects’& engineers’ perspective,” Asian J. Civ. Eng., vol. 9, 2018.
[4] C.Chang, K.Weiand Y.Shuai, “Research on the application of BIM
technology in the whole life cycle of construction projects,”2nd International
Workshop on Renewable Energy and Development IOP Conf. Series: Earth
and Environmental Science, no. 153, pp. 1-6, 2018.
[5] S. Seyis, “Pros and Cons of Using Building Information Modeling in the AEC
Industry,” J. Constr. Eng. Manage., vol. 145, no. 8, pp. 1–17, 2019.
[6] A. Fazli, S. Fathi, M. Hadi, M. Fazli, and B. Fathi, “Appraising Effectiveness
of Building Information Management (BIM) in project management,”
Procedia Technol., vol. 16, pp. 1116–1125, 2017.
[7] S. Rokooei, “Building Information Modeling in Project Management :
Necessities, Challenges and Outcomes,” Procedia - Soc. Behav. Sci., vol. 210,
pp. 87–95, 2015.
[8] B. Franz and J. Messner, “Evaluating the Impact of Building Information
Modeling on Project Performance,” J. Comput. Civ. Eng.,vol. 33, no. 3, pp.
1–9, 2019.
[9] D. Bryde, M. Broquetas, and J. Volm, “The project benefits of Building
Information Modelling (BIM)” Int. J. Pro. Manage., vol. 31, pp. 971–980,
2013.
[10] D. Migilinskas, V. Popov, V. Juocevicius, and L. Ustinovichius, “The
Benefits, Obstacles and Problems of Practical Bim Implementation,”
Procedia Eng., vol. 57, pp. 767–774, 2013.
[11] W. Shou, J. Wang, and X. Wang, “A Comparative Review of Building
Information Modelling Implementation in Building and Infrastructure
Industries,” Arch Computat Methods Eng., 2014.
[12] A. Guillen, A. Crespo, J. Gomez, V. Prida, K. Kobbacy, S. Shariff, “Building
Information Modeling as Assest Management Tool” IFAC-PapersOnLine,vol.

ISBN :978-81-945631-7-4

103
49, no. 28,pp. 191–196, 2016.
[13] Z. Liu, M. Osmani, P. Demian, A. Baldwin, “A BIM-aided construction waste
minimisation framework” Automation in Construction, vol. 59, pp. 1–23,
2015.
[14] J. Won and J. Cheng, “Identifying potential opportunities of building
information modeling for construction and demolition waste management and
minimization” Automation in Construction, vol. 79, pp. 3–18, 2017.
[15] Y. Kim, W. Hong, J. Park, and G. Cha, “An estimation framework for
building information modeling (BIM) -based demolition waste by type,”
Waste Management & Research, pp. 1–11,2017.
[16] V. Srivastava and S. Ahmed, “Urban solid waste management in the
developing world with emphasis on India : challenges and opportunities,” Rev
Environ Sci Biotechnol, 2014.
[17] R. Joshi and S. Ahmed, “Status and challenges of municipal solid waste
management in India : A review,” Cogent Environ. Sci., vol. 28, no. 1, pp. 1–
18, 2016.
[18] K. Sharmaand S. Jain, “Overview of Municipal Solid Waste Generation,
Composition, and Management in India,” J. Environ. Eng., vol. 145, no. 3,
2019.
[19] Pritiand K. Mandal, “Review on evolution of municipal solid waste
management in India : practices, challenges and policy implications,” J.
Mater. Cycles Waste Manag., 2019.
[20] S. Das, S. Lee, P. Kumar, K. Kim, S. Soo, S. Sundarand S. Bhattacharya,
“Solid waste management : Scope and the challenge of sustainability,” J.
Clean. Prod., vol. 228, pp. 658–678, 2019.

ISBN :978-81-945631-7-4

104
Optimization of Compound Casting through Simulation
Software: A Review

Pranesh A. Salagarkar1 and Kedar H. Inamdar2


1 PG Student, Department of Mechanical Engineering (M Tech Production)
2 Professor, Department of Mechanical Engineering,

Walchand College of Engineering,


Sangli- 416415, India.
1praneshsalagarkar@gmail.com
2 Kedar.inamdar@walchandsangli.ac.in

Abstract. In this paper the information about the use of casting simulation used
to optimize compound casting process is presented. There are different stages of
casting simulation process helps to modify casting design and optimize process
parameters in new casting product development. Different modules of casting
simulation program give a possible prediction of defects and their location. As
the number of steps increases in process, the number of defects increases. Due to
the many steps present in the casting process, industries may suffer from poor
quality and poor productivity Compound casting is casting made up of multi-
material helps to produce weightless component and low cost of the component.
In compound casting, two or more similar or dissimilar materials are cast
together. In two material compound casting, a material having a high melting
point is used as insert and material having a low melting point is cast around
insert material. Compound casting produces parts required for automobile,
shipping, aviation industries.

Keywords: Casting simulation, Multi material casting, Visualization of mold filling and
solidification.

1 Introduction

Metal casting is one of the most important manufacturing process used to make various
parts in aeronautics, automobile, military, naval industries. Up to date, it is not possible
to make defect-free castings. There are following steps in casting process for pattern
making, sand mould and core making, metal melting, metal pouring, solidification,
casting and separation, removal of gating systems. As the number of steps in casting
process increases, number of defects increases.
Casting simulation means the process of imitating casting phenomena with the help of
the mathematical model in the computer program. Casting simulation shows mould
filling, solidification with different colour coding, defects and its optimization. By
method optimization and casting simulation, it is possible to produce quality casting

ISBN :978-81-945631-7-4

105
with better yield. It helps to increase productivity by reducing shop-floor trials. The
complex shape of the casting can be performed after its simulation and defects and
material loss can be reduced. It adds value to the product. With the help of casting
simulation, it is easy to store the results of each trail virtually and reviewed months later
for similar projects [6].
compound casting can be made by casting of two similar or dissimilar materials one is
in solid-state as insert and one as liquid state as matrix takes place. Compound casting
helps to make the part for lightweight applications. Compound casting also helps to
achieve the required amount of properties by reducing cost [7][8].

2 Literature Review

B. Ravi [1] gives detailed information about mould filling, solidification of molten
metal, shrinkage detection. Metal casting phenomena is compared with the volcanic
flow and sea-wave splashing. The information consists of three major factors affecting
metal casting: Geometry, materials and process. Input for simulation is a 3D CAD
model with various allowances, moulding cores, process parameters, feed aids and
feeders. The output of simulation are mould filling visualization, solidification with
different temperature ranges, filling time, mould erosion, incomplete filling of mould
cavity. The casting can be modified by changing part orientation and mould layout,
changing the size and position of the gating system.
B. Ravi [2] gives guidelines of the best implementation of simulation technology for
the casting industry. Simulation is done for three reasons: Enhancement of quality of
casting, Improvement of yield and rapid development. The defects related to improper
filling and solidification of the cavity, shrinkage defects, defects related to cooling
stress can be calculated accurately by simulation technology. The casting simulation
technique contains following five stages: Date gathering, Methods design, Simulation,
Optimization and project closure.
Hajjari et. Al [3] stated appropriate use of compound casting for lightweight Al/Mg
couple production. In compound casting one metal is cast around insert of another
metal. Interferential microstructure as well as shear strength at the joint were studied.
Shear strength depends on interference thickness and it increases as a decrease in the
interference thickness. If aluminium is cast around magnesium inserts, it produces an
oxide layer at the interface causes a reduction in strength. After casting, from bottom
to top interference thickness of materials decreases due to decreases in the hydrostatic
pressure. The bottom part of casting shows brittle fracture failure and top part shows a
ductile fracture in a shear strength test.
Oliver et.al [4] studied intermetallic bond characteristics of the titanium insert and
aluminium matrix. The pushout test gives shear stress and circular bending test gives
flexural strength. Mechanical properties are studied by analyzing the metallographic
characteristics and FEM analysis at elastic state. The mechanical properties of the com-
pound casting can be improved by formation of chemical interaction layer. Failure due
to crack propagation takes place from bottom to top and matrix yielding takes place
from top to bottom.

ISBN :978-81-945631-7-4

106
M Divandhari et.al [5] performed an experiments of compound casting of aluminum
matrix and copper inserts by lost foam casting method. Copper inserts shows a good
wettability with aluminium and create a strong metallurgical bond. A microstructural
investigation is carried by dispersive X-ray and SEM technique. The wire affected zone
contain composition affected zone where melt starts to dissolve the wire and cooling
affected zone where cooling of the wire takes place due to precipitate of the first stage
of solidification.
K. Papis et.al [6] gives information about interface formation in the compound casting
of magnesium matrix and magnesium inserts. Hydroxide layer creates problem in the
metallurgical joining of magnesium and it can be avoided by the surface coating as a
pretreatment. The coating increases the wetting properties of cast materials. Shrinkage
cavity present at interface prevented by making appropriate solidification.
Ahmet Avci et.al [7] improved microstructural and mechanical properties of a low
carbon steel plated reinforced by gray cast iron. By increasing volume fraction, ductility
property of gray cast iron can be improved. As normalization temperature increases,
the flexural strength of compound casting increases. The flexural modulus property of
cast iron can be increased by reinforcing with steel plate.
M. Kro et.al [8] stated improvements in the formation of the interface in aluminium-
aluminium compound casting. For generation of defect less surface, some pretreatments
and Zn coating is done on aluminium inserts. Microhardness increases at the interface
if Zn coating is used.

3 Casting Simulation

Casting simulation means experimenting the real casting process with the help of math-
ematical model by the computer program. Programming of casting simulation can be
done by using finite difference method, finite volume method, finite element method
and vector element method. Fig. 1 shows benefits and concern of computer program to
manufacturing industries.

Fig. 1. Benefits and concern of computer program to manufacturing industries [2].

ISBN :978-81-945631-7-4

107
3.1 Need of Casting Simulation
a. There are many steps included in the casting process which leads to more error
in the casting process.
b. Casting simulation helps in visualization of mould filling, solidification,
defects formation without actually performing of casting.
c. With the help of casting simulation, quality is improved by minimizing casting
defects.
d. Casting simulation helps in optimizing the gating system and improves the
yield of the casting.
e. Casting simulation minimizes trials in new casting development by making a
prototype and reduces the rejection rate.

3.2 Benefits of Casting Simulation

Casting simulation has direct and indirect benefits. The direct benefit provides cost
reduction and indirect benefits provide value addition.

Quality and Yield Improvement: With the help of casting simulation, the optimum
gating system can be obtained, provides good quality casting and improves the yield of
casting. Improper design can be visualized by casting simulation technique and it is
analyzed for various observations. Small changes in the runner, riser provides a large
effect in defects reduction. Casting simulation helps to reduce inspection cost of the
casting [1].

Shop Floor Trials Reduction: Traditional casting method contains many steps in the
casting process like modification in existing casting, melting of the molten metal, pour-
ing of metal, inspection. Small modification in tools are required for casting requires
more cost. Some materials are costly in making a casting. Casting simulation reduces
that cost and provides solution without actually performing casting. Casting simulation
reduces the cost of reusability of trial components by providing the same results. The
Casting Simulation also reduces time required for casting [1].

Value Addition: Casting simulation helps to provide complex shape casting by opti-
mizing process parameters and reducing defects. Documentation of casting design and
modification can be done by a computer simulation program. Non-destructive test for
calculating internal defects takes higher cost. By using casting simulation it is possible
to find out internal defects, so it is a cost-effective method to find out defects. High
quality casting increases the goodwill of the casing [1].

Knowledge Management: Casting simulation helps to preserve input data required for
casting, results of casting simulation, modification in casting and can be reused for new
similar projects. Casting simulation helps in enhancing knowledge by the management
of available data and modifications [1].

ISBN :978-81-945631-7-4

108
3.3 Stages of Casting Simulation

The steps require for casting simulation are Data gathering, method design, numerical
simulation, method optimization and project closure.

Data Gathering: It is a first and most important step in casting simulation. Data col-
lected for casting simulation must be realistic and accurate. First 3D CAD model is
made of the part to be cast. then it is converted into STL format. After extracting STL
model in simulation software material properties are decided. Mould and core proper-
ties are selected for the casting part. New modifications related to the parting line, gat-
ing system, cores, feeders are decided in this stage [2].

Method Design: In this step, feeders, gating system, cores and feed-aids are added to
the 3D model in order to make cast part model. Number of iterations are taken for
simulations to make the defect less and optimized design. The Corrections required in
the design are done in this stage [2].

Numerical Simulation: It is the most important step in casting simulation process. here
FEM mesh is created and optimum elemental size is selected. Boundary conditions and
various coefficients in the simulation are decided in this step. Simulation results depend
on mould filling, solidification, cooling, stress concentration in casting. Data related to
results are presented in colour coding format in the post-processing module [2].

Method Optimization: Elimination of defects and yield improvement is done at this


stage by improving method design. After analyzing simulation, various defects in cast-
ing are observed and eliminated by modifying design. All the preprocessing work is
done in this stage. This stage saves time and cost [2].

Project Closure: After optimizing casting design and eliminating defects, all data is
documented carefully. Data contain images of various colour coded results, analysis
report and method report. All input and output data is stored in folder and backup folder.
Stored data can be used for future modification [2].

3.4 Applications of Casting Simulation

Casting Problem Identification: Traditional casting provides casting with various de-
fects at various levels and it provides poor yield in casting. The casting process is
simulated provides better control of process parameters on process. Casting simulation
helps to identify location of defects in casting and helps in designing of riser and gating
system to reduce defects.

ISBN :978-81-945631-7-4

109
Method Optimization: Traditional casting method for innovation for new products
requires a large number of shop-floor trials. Casting simulation helps to reduce shop
floor trials by proper method design with help of computer program. The small im-
provement in casting design leads large impact on use of energy utilized, material and
labour required for the casting process.

Part Design Optimization: Different kind of defects in casting depends on a different


kind of design. So it is necessary to produce a design which contains manufacturability
and functionality aspect. Design decides position of runner and riser in casting. In cast-
ing simulation, it is possible to modify the design as per manufacturability and func-
tionality.

3.5 Drawbacks in Casting Simulation

Cost of Simulation Software: Initial investment cost of casting simulation software is


very high. Casting simulation programs requires high capability hardware. Before using
simulation software it is required to train foundry engineers. Simulation software must
be updated to maintain improvement in accuracy in the casting process [9].

Managerial and Technical Support: For deciding technical inputs and outputs, labors
having sound domain knowledge are required. Quality of casting totally depends on the
interpretation of the method for casting simulation, it requires good design and quality
engineers. To solve simulation related issues, sound knowledge of the finite element
method is required [9].

Solid Modelling: Some firms are not reluctant to provide casting model CAD design
to casting industries due to security reasons. They provide 2D drawings rather than 3D
design. So casting industries to convert the 2D drawing to 3D design through local
designers. It will create errors in casting drawing and this error is not analysed till final
component inspection takes place [9].

4 Compound Casting

Compound casting process is a process in which more than two similar or dissimilar
materials are simultaneously cast together. In two material compound casting, a mate-
rial having high melting temperature is used as insert and low melting temperature ma-
terial is cast around insert material.

4.1 Steps used in Compound Casting

Detail Study of Part to be Cast: Detail study of the part to be manufactured is done
by performing various experiments. The part is studied for various stresses, temperature
and dynamic behavior in various situations.

ISBN :978-81-945631-7-4

110
Part Design and Material Selection: After the calculation of various stress and tem-
perature calculation, the part is modified to make the optimized design. Materials are
selected as per the requirement of design. Material is selected by taking consideration
of cost, thermal, mechanical and bonding properties.

Optimization of Compound Casting by Simulation: Optimization of the casting by


using simulation software is done and defects are minimized. Proper design of runner,
riser and feeder is done as per the requirement of casting [1][2].

Simulation for Bonding of Different Materials: Simulation is done for checking the
bonding strength of different materials. Heat transfer in terms of conduction and con-
vection is calculated and surface properties are determined as per requirements for
sound bonding [3].

Removal of Oxide Layer: While joining of different materials, the oxide layer is
formed at the interface of different materials. oxide layer prevents bonding between
materials. To avoid the oxide layer, the coating of zinc is done on the insert surface [6].

Casting Process: After application of coating, pouring of matrix material is done. Cast-
ing can be done by various types like LFC casting, sand casting, die casting [5]. For-
mation of different phases can be controlled by using a controlled temperature environ-
ment. After pouring metal, solidification is done as per requirements of final properties
by quenching or slow cooling. After casting process heat treatment can also produce
improved properties in compound casting [8].

Testing and Inspection : After casting of part takes place, then the part is transferred
for inspection. Inspection of the first component is done for destructive and non-de-
structive tests. If the final component is as per requirement then no need to do an in-
spection of remaining parts [4][7].

4.2 Advantages of Optimization of Compound Casting Process


a. Material selection is done as per requirements so high-cost material can be
used as per need only. Cost of material decreases thus the final total cost of
component decreases.
b. Some applications require the weight of component minimum as possible
without affecting mechanical and thermal properties of material. Compound
casting provides material provides weightless component by selecting low
density materials having sound mechanical and thermal properties.

4.3 Disadvantages of Optimization of Compound Casting Process


a. Compound casting is a very complex phenomena because it requires a lot of
control during the casting process. At the interface of different materials, the

ISBN :978-81-945631-7-4

111
oxide layer is formed and it must be removed before solidification to make
good metallurgical bond.

5 Acknowledgement

The authors acknowledge the support provided by Walchand college of engineering


Sangli. The authors would also like to thank the support of the Poorva metal casting
industries, Sangli.

References
1. B. Ravi, Casting Simulation and Optimization: Benefits, Bottlenecks, Indian Foundry Jour-
nal, 3-5, 2008.
2. B. Ravi, Casting Simulation- Best Practices, Transactions of 58th Indian Foundry Congress,
Ahmadabad, 1-6, 2010.
3. E. Hajjari ,M. Divandari ,S. Razavi, S. Emami, T. Homma and S. Kamado, Dissimilar join-
ing of Al/Mg light metals by compound casting process, Journal of Material Science ,46,
6491–6499, 2011.
4. O. Dezellus , L. Milani , F. Bosselet, M. Sacerdote-Peronnet, D. Rouby and H. Jain Mechan-
ical testing of titanium/aluminium–silicon interfaces by push-out, Journals of Material Sci-
ence,43, 1749-1756, 2008.
5. M. Divandari and A. Golpayegani, Study of Al/Cu rich phases formed in A356 alloy by
inserting Cu wire in pattern in LFC process, Materials and Design ,30 ,3279-3285, 2009.
6. K. Papis, J. Loffler and P. Uggowitzer, Interface formation between liquid and solid Mg
alloys-An approach to continuously metallurgic joining of magnesium parts, Materials Sci-
ence and Engineering A,527, 2274–2279, 2010.
7. A. Avcı , N. Ilkayaa, S. Mehmet and A. Akdemira, Mechanical and microstructural proper-
ties of low-carbon steel-plate-reinforced gray cast iron, Journal of materials processing tech-
nology, 209, 1410–1416, 2009.
8. M. Kro , T. Tanski1, P. Snopinski1 and B. Tomiczek1, Optimization of Mechanical Proper-
ties of Al–Al‐Compound Castings by Adapted Heat Treatment, Advanced Engineering Ma-
terials, 20, 1-10, 2018.
9. S. Siddalingswami, and S. Dulange, Advanced Techniques in Casting Defects and Rejection
Analysis: A Study in an Industry, International Journal of Innovations in Engineering Re-
search and Technology, 2,1-9, 2015.

ISBN :978-81-945631-7-4

112
A REVIEW ARTICLE OF LOW POWER
CONSUMPTION HETEROGENEOUS ROUTING
PROTOCOL IN WSN

Prati Tembhre#1 and Kanchan cecil#2


#Department of Electronics & Telecommunication Engineering,
Jabalpur Engineering College, Jabalpur, India

1Prati040196@gmail.com
2cecil.kanchan@gmail.com

Abstract. This paper presents an audit on vitality effective grouping con-


ventions for heterogeneous remote sensor organize. Vitality utilization is
the basic plan issue in the remote sensor organize since every hub has a
battery& every battery has constrained lifetime. Grouping based conven-
tions are the most ideal approach to improve the system lifetime. Drain
convention is the main various leveled bunching convention for homo-
geneous remote sensor arrange in which all hubs are having a similar
vitality. The grouping conventions for homogeneous WSN not per-
formed well for heterogeneous WSN on the grounds that the hubs in het-
erogeneous WSN have diverse vitality levels. In this way for vitality
productivity in heterogeneous WSN grouping conventions like SEP,
DEEC & so on. Right now, have talked about the working of heteroge-
neous.

Keywords: Heterogeneous Wireless Sensor Networks, Cluster Head, Energy-efficient


Clustering Protocols.

1 Introduction

A Wireless sensor arrange comprises of tens to thousands of sensor hubs that are thickly
sent in a sensor field and have the capacity to accumulate information and course data
back to base station [1-5]. Presently days, Wireless Sensor Network is utilized in a few
application, for example, recognizing and following soldiers, tanks on a battleground,
process traffic stream on streets, register stickiness and different angles in fields, fol-
lowing work force in structures. A sensor hub incorporates detecting unit, power unit,
and handling unit. Remote Sensor Networks attributes are as per the following:
a) Dynamic system topology
b) Power requirement.
c) Do not have worldwide ID.
d) Heterogeneous hubs.

ISBN :978-81-945631-7-4

113
e) Nodes are inclined to disappointments.
Remote sensor organize is a system that comprises of little, unpredictable & huge num-
ber of sensors and at any rate one base station or sink hub. Most testing issue in remote
sensor arrange is the restricted battery intensity of sensor hubs utilized in the system.
To expand the vitality of sensor hubs, vitality is ideally administered all through the
remote sensor organize. So the way to improve the existence time of the system is to
plan compelling and vitality mindful conventions. Steering convention can be organize
structure based or convention activity based. Right now, instructional exercise of exist-
ing directing conventions in remote sensor systems is done. Testing issues for WSNs
are Energy utilization and system life time. In the accompanying segments which are
depicted beneath, we present different existing directing conventions with their benefits
& negative marks.

2 Design Issues of Routing Protocols

At first WSNs was chiefly spurred by military applications for combat zone observa-
tions. Regular citizen application area of remote sensor systems have been viewed as
later on, for example, ecological, social insurance and creation , brilliant home & so on.
To meet this expansion, the accompanying huge structure issues of the sensor arrange
must be thought of:
• Operating Environment: Sensor hubs might be sent in any condition conditions.
• Power Consumption: Sensor hubs are outfitted with restricted battery lifetime.
• Data conveyance models: Data conveyance models decide when
• Network Dynamics: Sensor hubs are further versatile and in this way sensor arrange
isn't static.

3 Literature Review

Most sensor systems are application explicit & have diverse application necessities. In
this manner, all or part of the accompanying principle structure goals is considered in
the plan of sensor systems:

Little hub size: Since sensor hubs are normally conveyed in a cruel or antagonistic
condition in huge numbers, decreasing hub size can encourage hub organization. It will
likewise lessen the force utilization & cost of sensor hubs.

Low hub cost: Since sensor hubs are generally sent in a brutal or unfriendly condition
in enormous numbers and can't be reused, diminishing expense of sensor hubs is sig-
nificant and will result into the cost decrease of entire system [6-10].

ISBN :978-81-945631-7-4

114
4 Literature Review

Sameer Tilak, Nael B. Abu-Ghazaleh, Wendi Heinzelman; ― A Taxonomy Wireless micro-


sensor Network Models. In future shrewd situations, remote sensor systems will assume
a key job in detecting, gathering, &spreading data about natural marvels. Detecting
applications speak to another worldview for arrange activity, one that has various ob-
jectives from increasingly customary remote systems. This paper inspects this develop-
ing field to group remote small scale sensor systems as per diverse correspondence
capacities, information conveyance models, and system elements. This scientific cate-
gorization will help in characterizing proper correspondence foundations for various
sensor arrange application subspaces, permitting system fashioners to pick the conven-
tion design that best matches the objectives of their application. Also, this scientific
classification will empower new sensor arrange models to be characterized for use in
further research around there.

The Smart Detect Project Team, Indian Institute of Science, Bangalore, India; ―Wireless
Sensor Networks for Human Intruder Detection‖ Report, May 2010 . In this paper we re-
port on the results of an exploration & showing venture on human interruption discov-
ery in an enormous secure space utilizing an impromptu remote sensor arrange. In the
paper they report on the particular building arrangement that was built up: the different
compositional decisions & the related explicit structures. Notwithstanding building up
an evident framework, the different issues that emerged have offered ascend to a lot of
fundamental research in territories, for example, land parcel directing, dispersed factual
discovery, sensors and related circuits, a low power versatile smaller scale radio, and
power upgrading implanted frameworks programming.

Tian He, Sudha Krishnamurthy, John A. Stankovic, etc. ―VigilNet: An Integrated Sensor
Network System for Energy-Efficient Surveillance‖. This paper depicts one of the signif-
icant endeavors in the sensor arrange network to construct an incorporated sensor or-
ganize framework for observation missions. The focal point of this exertion is to obtain
and confirm data about adversary abilities and places of threatening targets. Such mis-
sions frequently include a high component of hazard for human faculty and require a
high level of stealthiest. Consequently, the capacity to convey unmanned reconnais-
sance missions, by utilizing remote sensor systems, is of extraordinary pragmatic sig-
nificance for the military.

G.J. Pottie and W.J. Kaiser, ―Wireless Integrated Network Sensors‖, Communications of
the ACM, 2000. Remote incorporated system sensors (WINS) give dispersed system and
Internet access to sensors, controls, and processors profoundly inserted in hardware,
offices, & the earth. The WINS arrange speaks to another checking and control capacity
for applications in such enterprises as transportation, fabricating, social insurance, nat-
ural oversight, and wellbeing and security.

Ruchi Mittal, M.P.S Bhatia, ―Wireless Sensor Networks for Monitoring the Environmen-
tal Activities‖. The creators present Wireless sensor arrange which when joined with
different territories at that point assumes a significant job in examining the information

ISBN :978-81-945631-7-4

115
of woods temperature, bioinformatics, water pollution, traffic control, media transmis-
sion & so forth. Because of the headway in the territory of remote sensor arrange &
their capacity to produce enormous measure of spatial / transient information, draw in
specialists for applying information mining systems & getting intriguing outcomes. En-
thusiasm for remote sensor organizes in checking the natural exercises is developing
and this is drawing in analysts for discovering the examples from huge measure of spa-
tial / worldly data sets.

Najmeh Kamyab Pour, “Energy Efficiency in Wireless Sensor Networks” Wireless


sensor systems (WSNs), as disseminated systems of sensors with the capacity to detect,
process and convey, have been progressively utilized in different fields including de-
signing, wellbeing and condition, to wisely screen remote areas requiring little to no
effort. Sensors (a.k.a hubs) in such systems are answerable for four significant errands:
information collection, sending and accepting information, and in-organize information
preparing. This suggests they should viably use their assets, including memory use,
CPU power and, all the more significantly, vitality, to expand their lifetime and profit-
ability. Other than collecting vitality, expanding the lifetime of sensors in the system
by diminishing their vitality utilization has gotten one of the fundamental difficulties
of utilizing WSNs in reasonable applications. In light of this test, throughout the most
recent couple of years there have been expanding endeavors to limit vitality utilization
by means of new calculations and systems in various layers of the WSN, including the
equipment layer (i.e., detecting, handling, transmission), organize layer (i.e., conven-
tions, steering) and application layer; a large portion of these endeavors have concen-
trated on explicit and separate parts of vitality dispersal in WSNs.

Krishan Kumar, Ms. Shruti Goel, “Literature Review to Optimize the Energy Consump-
tion in Wireless Sensor Network” This paper centers around the model to lessen battery
overhead and improve the lifetime of a remote sensor arrange, utilizing the idea of Ep-
idemic Model. The observing of the system is finished by an extraordinary hub that
uses a similar convention for correspondence and monitors the condition of the hubs as
it is spread. It tends to be utilized based on their positions, persistent detecting, occasion
discovery, area detecting and so forth. It will be accomplished as far as numerical ex-
amination. The writing is helpful to discover approaches to diminish the battery over-
head and upgrading the lifetime of a remote sensor organize.

Tifenn Rault, “Energy-efficiency in wireless sensor networks” Remote sensor sys-


tems (WSN) are key segments of frameworks of frameworks (SoS) since they can be
incorporated in complex congregations so as to react to current cultural issues, for ex-
ample, the maturing of the populace, the streamlining of common assets and the de-
crease of carbon impression. Regularly, kinematic sensors can be utilized to remotely
administer old patient, dampness sensors can be conveyed to control field water system
for an increasingly economical horticulture, and associated vehicles will enhance the
administration of urban traffic while constraining contamination. In these unique situ-
ations, sensor hubs are required to work self-sufficiently in unattended region for ex-
tensive stretches of time since it isn't constantly conceivable to physically recharge the
bits in view of their number, the support costs or the unavailability of observed locales.
Surely, sensors are battery-controlled gadgets with stringent asset confinement, partic-
ularly as far as vitality.

ISBN :978-81-945631-7-4

116
Ogundile OO, Alfa AS, “A Survey on an Energy-Efficient and Energy-Balanced
Routing Protocol for Wireless Sensor Networks.” Wireless sensor systems (WSNs)
structure a significant piece of modern application. There has been developing enthu-
siasm for the potential utilization of WSNs in applications, for example, condition
checking, debacle the executives, human services observing, knowledge observation
and resistance surveillance. In these applications, the sensor hubs (SNs) are conceived
to be sent in sizeable numbers in a remote region, and it is very hard to supplant these
SNs after complete organization in numerous situations. Hence, as SNs are transcend-
ently battery controlled gadgets, the vitality utilization of the hubs must be appropri-
ately overseen so as to delay the system lifetime and usefulness to a sane time.
D Laxma Reddy ; V Aran ; A V Paramkusam ; N Nagaraju, “Wireless sensor net-
works algorithms to improve energy efficiency” These papers proposed to reason the
vitality exhaust and to improve the existence snapshot of the arrangement of associa-
tions in Wireless sensor organize (WSN). The information convene by every sensor is
communicated over the framework to one procedure centermost that uses all imparted
information to see singular setting or discover an event. The message voyaging tech-
nique ought to be planned to chop down the confined vitality ability of the sensors.
Bunch sensors assembled enthusiastic about groups, all together that sensors be in con-
tact data just to group heads so the bunch heads trade the aggregate information to the
procedure focus, could spare vitality.

Noor Zaman, Low Tang Jung, and Muhammad Mehboob Yasin, “Enhancing En-
ergy Efficiency of Wireless Sensor Network through the Design of Energy Efficient
Routing Protocol” Wireless Sensor Network (WSN) is known to be a profoundly asset
obliged class of system where vitality utilization is one of the prime concerns. In this
exploration, a cross layer plan system was embraced to structure a vitality effective
steering convention entitled "Position Responsive Routing Protocol" (PRRP). PRRP is
intended to limit vitality expended in every hub by (1) decreasing the measure of time
in which a sensor hub is in an inert listening state and (2) diminishing the normal cor-
respondence separation over the system.

Annamalai Lakshmanan, “Literature Review on Energy Efficient Algorithm For


WSN” The principle issue perseveres in everyday life is that the sensor hubs are con-
veyed in remote territories. Because of the sending of sensor hubs in remote territories,
it is fueled by a battery that diminishes the lifetime of the sensor hubs. Central point
that influence the lifetime of sensor hubs are ceaseless checking, intermittent control
messages, and the recurrence of occasions that happens. This paper talk about the writ-
ing survey of the vitality effectiveness calculations utilized in the current papers to ex-
pand the lifetime of the remote sensor arrange is been examined.

Sarika Yadav, Rama Shankar Yadav, “A review on energy efficient protocols in


wireless sensor networks” In past decade, remote sensor systems have picked up con-
sideration by scientists, producers just as the clients for remotely checking undertakings
and viable information assembling in different condition. The remote sensor hubs are
little battery fueled gadgets having constrained lifetime, thus for life span and

ISBN :978-81-945631-7-4

117
unwavering quality, the chief concern is limiting vitality utilization and augmenting
system lifetime while planning conventions and applications. In this paper, we survey
the principle configuration issues dependent on the model of remote sensor systems:
sans structure and organized for information assortment and conglomeration where job
of bunching and directing is talked about for vitality protection and improving system
lifetime. These plan procedures are the establishment of any systems administration
convention from the vitality sparing perspective. A thorough unthinkable outline of
various methodologies under sans structure and organized remote sensor systems for
information assortment and collection, bunching and steering is given key issues.

Leonidas J. Guibas, ―Sensing, Tracking, and Reasoning with Relations‖, Stan-


ford University. The sensor net engineering displayed in this paper begins from a sig-
nificant level portrayal of the crucial assignment to be cultivated and afterward direc-
tions singular hubs to detect and convey in a way that will achieve the ideal outcome
with regard for limiting the computational, correspondence, and detecting assets that
will be required.

Moiz Chasmai, Rajiv Das, etc. ―Wireless Sensor Network for snow-met data
monitoring in Indian Himalayas - A Review‖ Report- Snow and Avalanche Study
Establishment. Torrential slide estimate requires information assortment of day off
meteorological parameters on regular schedule from the out of reach regions in the
Himalayas during winter. To gather such information the SASE has introduced number
of AWS and RRTS which measure different snow met parameters, for example, en-
compassing temperature, relative dampness, air pressure, snow surface temperature,
wind speed/bearing, and so forth and transmit the information to a Central Station.
WSN is by all accounts a potential answer for the specific use of nonstop snow-met
information obtaining in the Himalayas on the grounds that WSN has the ability to
conquer the confinements of the current systems by decreasing the endeavors and co-
ordinations for setting up the system, expanding the territory of perception and dimin-
ishing endeavors in support by highlighting specially appointed systems administration
capacity [5,6].

Intanagonwiwat and R. Govindan and D. Estrin, ―Directed Diffusion: A Scalable


and Robust Communication‖ Mobicom 2000. Sensor systems have unexpected pre-
requisites in comparison to different remote systems. The requirement for power and
adaptability prompts the structure of limited calculations, where sensors just communi-
cate with different sensors in confined region and have, best case scenario a backhanded
worldwide view.aterial.

ISBN :978-81-945631-7-4

118
5 Comparison between different energy efficient protocol table

5.1 PDR for routing algorithms:

Fig. 1. Packets sent to the BS Versus Time (Rounds).

Fig.1 appears for examination between steering conventions like as a LEACH, TEEN,
DEEC, SEP concerning different rounds. Consequently this chart is speaking to of
higher PDR in SEP directing convention 3.5x104 then other. Presently various steering
conventions are being utilized to build the vitality productivity of the system, with two
particular kinds of conventions, homogenous and heterogeneous. In these two conven-
tions, the SEP (Stable Election Protocol) is one of the best heterogeneous conventions
which increment the strength of the system. Right now, propose a moving toward the
εFCM calculation in bunching the SEP convention which makes the WSN arrange more
vitality effective. The reproduction results demonstrated that the SEP-εFCM proposed
convention performed superior to the ordinary SEP convention.

ISBN :978-81-945631-7-4

119
5.2 Energy Based comparison:

Fig. 2. Dead Nodes Versus Time.

Fig.2 shows a Dead Nodes Versus Time for different convention. SEP is perform lower
number of round as contrast with other Unlike [5], we don't require any worldwide
information on vitality at each political race round. Not at all like [4, 8], SEP is dynamic
in that we don't expect any earlier conveyance of the various degrees of vitality in the
sensor hubs. Besides, our examination of SEP isn't just asymptotic, for example the
investigation applies similarly well to little estimated systems.

No.of Round Leach TEEN DEEC SEP


500 162 204 166 184
1000 80 126 96 120
2000 1 65 33 50
3000 0 24 24 6
4000 0 7 10 3

Table 1. Comparison of LEACH-C, TEEN, DEEC and SEP in terms of nodes alive

Table 1. this table show SEP (Stable Election Protocol) so every sensor node in a het-
erogeneous two-level hierarchical network independently elects itself as a cluster head
based on its initial energy relative to that of other nodes [10-12].

ISBN :978-81-945631-7-4

120
6 Conclusion and Future Research

One of the primary difficulties in the structure of directing conventions for WSNs is
vitality proficiency because of the rare vitality assets of sensors. A definitive goal be-
hind the directing convention configuration is to keep the sensors working for whatever
length of time that conceivable, subsequently broadening the system lifetime. The vi-
tality utilization of the sensors is commanded by information transmission and gather-
ing. In this way, directing conventions intended for WSNs ought to be as vitality effec-
tive as conceivable to draw out the lifetime of individual sensors, and consequently the
system lifetime.
Right now, have studied an example of steering conventions by considering a few
order criteria, including area data, organize layering and in-arrange handling, infor-
mation centricity, way repetition, arrange elements, QoS prerequisites, and system het-
erogeneity. For every one of these classifications, we have talked about a couple of
model conventions. Two significant related research bearings ought to get considera-
tion from the analyst specifically the structure of steering conventions for obligation
cycled WSNs, and three-dimensional (3D) sensor fields when planning such conven-
tions. Albeit a large portion of research take a shot at WSNs, specifically, on steering,
considered two-dimensional (2D) settings, where sensors are conveyed on a planar
field, there are a few circumstances where the 2D supposition that isn't sensible and the
utilization of a 3D configuration turns into a need[12].

References

[1] Fifi Farouk, Rawya Rizk and Fayez W. Zaki “Multi-level stable and energy-effi-
cient clustering protocol in heterogeneous wireless sensor networks,” IET Wireless
Sensor System, Volume Number. 4, Issue Number. 4, pp. 159–169, 2014.

[2] Arafat Abu Malluh, Khaled M. Elleithy, Zakariya Qawaqneh, Ramadhan J. Mstafa
and Adwan Alanazi, “EM-SEP: An Efficient Modified Stable Election Protocol,”
American Society for Engineering Education (ASEE Zone 1), Zone 1 Conference, pp
1-7, 2014

[3] Sandeep Verma and Kanika Sharma, “EEZECR: Energy Efficient Zone Divided
and Energy Balanced Clustering Routing Protocol in Wireless Sensor Network,” Cir-
cuits and Systems: An International Journal (CSIJ), Volume Number. 1, Issue Number.
1, 2014.

[4] Anitha, R.U, Kamalakkannan, P., "Enhanced cluster based routing protocol for mo-
bile nodes in wireless sensor network," Pattern Recognition, Informatics and Mobile
Engineering (PRIME), International Conference, pp.187, 2013.

ISBN :978-81-945631-7-4

121
[5] O. Rehman, N. Javaid, B. Manzoor, A. Hafeez, A. Iqbal and M. Ishfaq, “Energy
Consumption Rate based Stable Election Protocol (ECRSEP) for WSNs,” International
Workshop on Body Area Sensor Networks ELSEVIER, pp. 1–6, 2013.

[6] A. A. Khan, N. Javaid, U. Qasim, Z. Lu and Z. A. Khan, “HSEP: Heterogeneity-


aware Hierarchical Stable Election Protocol for WSNs,” Communications (ICC), IEEE
International Conference, pp. 1-5, 2012.

[7] A. Kashaf, N. Javaid, Z. A. Khan and I. A. Khan, “TSEP: Threshold-sensitive Stable


Election Protocol for WSNs,” Communications (ICC), 2011 IEEE International Con-
ference, pp. 1- 5, 2012.

[8] Dilip Kumar, “Performance analysis of energy efficient clustering protocols for
maximising lifetime of wireless sensor networks,” IET Wireless Senor. System, Vol. 4,
Iss. 1, pp. 9–16, 2012.

[9] Lutful Karim and Nidal Nasser, “Energy Efficient and Fault Tolerant Routing Pro-
tocol for Mobile Sensor Network,” Communications (ICC), 2011 IEEE International
Conference, pp. 1-5, Issue Number. 1550-3607, 2011

[10] Yun Zou, Huazhong Zhang and Xibei Jia, “Zone-Divided and Energy-Balanced
Clustering Routing Protocol For Wireless Sensor Networks,” Broadband Network and
Multimedia Technology (ICBNMT), 4th IEEE International Conference Pp. 112 – 117,
2011.

[11] Brahim Elbhiri, Saadane Rachid, Sanaa El fkihi and Driss Aboutajdine, “Devel-
oped Distributed Energy-Efficient Clustering (DDEEC) for heterogeneous wireless
sensor networks,” IEEE I/V Communications and Mobile Network (ISVC), 5th Inter-
national Symposium, 2011.

[12] Parul Saini and Ajay K Sharma, “Energy Efficient Scheme for Clustering Protocol
Prolonging the Lifetime of Heterogeneous Wireless Sensor Networks,” International
Journal of Computer Application, Volume 6– Issue No.2 2010.

ISBN :978-81-945631-7-4

122
Achieving CIA using Hierarchical access control: a
Review

Smita Athanere1 and Dr. Ramesh Thakur2


1
Computer Engineering, IET, DAVV, Indore, MP
2
International Institute of Professional Studies, DAVV, Indore, MP

Abstract. In present time public or private organisation need arrangement of


working staff in hierarchy. Then how this hierarchical arrangement is possible in
that organisation since every user is having different kinds of access control.
Some of them have less and some of them have more. Controlling this type of
access in a hierarchy is an interesting research topic in computer security. Many
researchers come up with many solutions over the time. This paper analyses four
security issues (How to access Hierarchical system, How to communicate se-
curely, How to manage key securely, How to develop secure hierarchical access
control system) and determine the level to which these security issues have been
identified by the researchers. Analysis of research contribution of these four se-
curity issues from three point of view conceptual model of HAC, the research
methodologies used and the respective stream used. This paper pinpointed that
most of the research on this topic has focused on the technical conditions and on
issue of how to access HAC system and secure key management and safe com-
munication. This issue can be solved by mathematically. On the basis of this
analysis, we direct new direction for analysing and implementing Hierarchical
access control system.

Keywords: DAG, HAC-Hierarchical access control, POSET

1 Introduction

In such environment where multiple users are working together, problem of access con-
trol is very important topic. In such environment users are categorized in various dif-
ferent classes and arranged into hierarchical structure. All resources are also classified
into security classes. In this manner higher category user class has higher privileged
resources and lower category user class has lower privileged resources. And here a re-
source means data as well as program. Many researchers told about different access
control schemes in a hierarchical structure can be found in the studies on multilevel
databases security.
Why so much emphasis is given to information security because there is very huge
utilization of computers along with internet now a day. There are number of

ISBN :978-81-945631-7-4

123
conferences, workshops and journals dedicated to the security aspect of Hierarchical
access control system. In this, contribution by computer scientist cryptologist, mathe-
matician, engineers from electrical stream computer engineer and research scholar is
involved. However, these contributions often have very different views on the key Hi-
erarchal access control problem and their respective solution. This analysis shows that
people belonging to computer science, cryptology, computer engineering often seem to
have a less knowledge of the contribution made by researchers in other discipline. This
tends to two different inferences like first is we can see that marking security problem
actually require interdisciplinary efforts and second is that researchers of different dis-
cipline generally not try for reinvention. With such diversity in field of HAC, it is re-
markable to find that there is few research exercise in inter disciplinary research. Con-
tributions are only devoted to fields like cryptology, computer science and engineering,
information security. To make impression of the field, such analysis is necessary in
order to see broad picture and to see on what previous research work has emphasized
and determine those areas where the need of future work is needed most. Lack in the
detailed survey on HAC contribution it becomes necessary to study how and to what
amount this issue is covered by previous research. To accomplish this we need to
choose some conceptual tool from the past research that will help us to make sense of
and classify the exiting research work. These can be models for HAC and research path
adopted.

Specific conferences or journals are not sufficient in order to get more details of re-
search effort. This paper analysed the information security literature up to 2018. Some
considered studies are beyond the scope of analysis like ethical analysis. We cannot
consider these things into particular security issue of HAC. Second section of paper is
about analysis scheme for study of issues including security of resources and infor-
mation in hierarchical structure. In third section types of hierarchies are given. Fourth
section describes methodologies of key management. Fifth section is about types of
access control. In sixth section previous research is analyzed in tabular form on the
basis some criteria. Lastly a summary is there..

2 A scheme for study of issues on Hierarchical access control


security
To get clarity of various contributions we need to set certain questions for their cat-
egorization and organization.
a) Access to Hierarchical system- How users of different category and level
access sensitive resources
b) Secure communication- How communication between different users is en-
sured secure.
c) Secure key management- How key generation, key distribution and data en-
cryption is managed.
d) Implementation of secure HAC- How can HAC is developed in order to

ISBN :978-81-945631-7-4

124
maintain confidentiality, integrity and availability.
Before concentrating on above four issues there are many possible other issues like
how to create and implement new policies and security guidelines, how and what to
manage, management of unwanted movement of control and information, management
of embedded kind of security, development of secure environment for programming,
how we manage secure programming language, how to solve problem of secure key
management and problem of trusted third party and certificate authorities how to man-
age customers viewpoint toward organization’s aims and policies.

While studying and analyzing these issues, we came to this conclusion that we can-
not cover all aspects of security with respect to HAC. There could be chances of biasing
that towards some subarea or towards some discipline. To get rid from this situation
we are not going to consider all aspects of these issues only abstraction for this focussed
on four above issues. These issues represent abstraction for all aspects of contribution
for the HAC. How should security of HAC is managed and how can we develop HAC
are the key issues regarding key generation and distribution.

Confidentiality, availability, integrity, and non repudiation are the security require-
ments connected with these issues. Confidentiality is detection and prevention of unau-
thorized access to information. Integrity is information should not be updated by unau-
thorized users. Designing of a secured hierarchical access control system includes re-
quirement such as representation and modelling of different security requirement, to
collect different security requirement and how to get surety that designed HAC accom-
modates the requirement. This paper includes all the analysis of various contributions
in tabular form so it is simple for discrimination of different work toward this domain
of hierarchical access control.

3 Major types of Hierarchical organization

a. Linear type –In this type each element in hierarchy has only one direct prede-
cessor (up) and one direct successor (down).
b. Tree type –In this type elements can have many direct successor but one pre-
decessor
c. DAG type –In this type Directed Acyclic graph, in this elements have many
successor as well as many predecessor.

ISBN :978-81-945631-7-4

125
•Linear •DAG
•Tree

Any organizational hierarchy generally represents in DAG hierarchy in


turns it is a POSET (Partially ordered set) structure. DAG hierarchy can be
classified into three types
a. Balanced Hierarchy
In this hierarchy same numbers of levels are in every branch of tree and
every member is having parent from just immediate above level.

b. Unbalanced Hierarchy
In this hierarchy the leaf classes at some branches will be deeper than in the
other branches and every member is having parented from just immediate
above level.

c. Ragged Hierarchy
In this hierarchy, control of at least one security class will not be directly
under the control of a parent from the level immediately above, but from a
higher level which means that they come directly under the control of a super
senior.

A pyramid structure is the base for hierarchical organization. Except the super Boss
every employee in the organization, is subordinate to upper level. This structure is hav-
ing multiple entities which are arranged one below the other depending on their role.
Advantages-
• Employees is assigned and also identifies certain level of leadership, account-
ability and responsibility in that particular organization
• Motivation for benefits is also there in that organization likes opportunities for
promotion.
• Employees can have recognition as specialist in hierarchical structures. Since
depending on their role work field is getting specific and employee can be-
come expert.
• In this manner loyalty comes in employee toward their department and they
can do best in their areas.

Limitation-

ISBN :978-81-945631-7-4

126
A partially ordered relation is defined in the set SC as SCi ≥ SCj which means security
clearance of SCi is greater or equal to the SCj where SCi is ancestral class and SCj is
descendent class.

4 A Methodologies for key management for Hierarchical access


control

There are mainly three types of key management strategies to access hierarchy a)
centralized b) decentralized c) distributed.
a) Centralized
In centralized key management scheme in group researchers apply a single cen-
tral authority called key server and a hierarchical structure to manage keys during
key generation, distribution and key updating. It includes three main stages those
are 1) Key Generation 2) offline pre key distribution 3) revocation of authenticated
node 4) key distribution in secure manner 5) rekeying or update of keys [1] [2] [3]
[4] [5].
Harney and Muckenhirn [1] proposed that there is a group of n members and in
that group a group manager called key server which manages information of all
group members. It takes care of n number of keys which are shared and responsible
for group communication. Key distribution methods can be classified as paired keys,
hierarchical arrangement of keys, broadcast the key deriving information.
Moharrum, R. Mukkalamala, and M. Eltoweissy[2] proposed a new CKDS means
efficient and scalable combinatorial key distribution scheme for supporting secure
group communications. They used combinatorial exclusion based method for key
distribution.
A. Yilmaz, G. Noubir, G. Lin, and T. Kaya [3] proposed that multicast group
management protocol which is dynamic that provide the solution for the problem of
mobility un trusted links and multi hop communication cost. In this members partic-
ipate actively to support security and which is distributed among the members of
group.
Pietro, Mancini, Law, Etalle, and Havinga [5] proposed extended logical key hi-
erarchy and this LKH ensures security.

b) Decentralized
In decentralized group key management scheme total structure is divided into
subgroups. Subgroup can be call as clusters or classes. Sub group head or class con-
troller responsible for key management for its subgroup or class of users or class of
nodes. For achieving these two approaches are used local keys and a common key.
In local key one user act as class controller and rest of the users are members. Com-
munication done by class group key (CGK) used to secure intra class traffic and it is
shared between class controller and its class members. CGK is encrypted by KEK
key encryption key and distribute to class member. But in common key no interme-
diate operation takes place so beneficial over local key method in terms of compu-
tation, storage needed and bandwidth used [6][7][8].

ISBN :978-81-945631-7-4

127
Bouassida, Chrisment, and Festor[6] suggested that BAAL protocol for key dis-
tribution avoiding centralized administration and in [7] they proposed sequential
multisource model include localization and mobility hence optimizes bandwidth
consumption and energy.
Varadharajan, Hitchens, and Shankaran [8] worked on parallel and distributed
computing in ad hoc networks.

c) Distributed
In distributed group key management all the members of group should cooperate
to generate and distribute encryption key to make whole communication secure
[9][10][11][12][13].
T. Chiang and Y. Huang [9] proposed that how an user can compose a key in
multicast group and exchange using Diffie Hellman method.
Ingemarson, D. Tang, and C. Wong [10] worked on system of conference key.
Madhusudhanan, Chitra, and Rajan [11] proposed key management scheme based
on mobility.
Steiner, Tsudik, and Waidner[12] enhances Diffi Hellman scheme to highly dy-
namic environment for CLIQUES
Madhusudhanan, Chitra, and Rajan [13] suggested scheme for lowering down the
drop rate of packets and improves the confidentiality level by providing key man-
agement methods.

5 Types of Access control systems

a) Access control based on Credential -If a user want an access to any resource
or data he require certain certificate information to gain access [14] [15].
Kaiwen,S.,Lihua,Y[4] proposed hybrid access control based on attribute.
Touti,l.,Challal,Y[15] worked on access control based on activity per-
formed by user. They used finite state machine and asymmetric encryption
algorithm.

b) Access control based on Attribute -If a user has some special kind of char-
acteristic can be called as attribute to gain access for certain resource or data
[29].
J. Meng, H. Wen, Y. Jiang Bin Wu and Y. Xie [29] proposed three layered
structure to provide secure access of resources using modified hierarchical
attribute based system.
c) Access control based on Capability -If a user want an access to any resource
or data must have some capability and a capability is an enforceable communi-
cable right mark-up which corresponds to a certain value that specifies unique
access rights to object possessed by subjects [16].
Li,F Han ,Y.,Jin,C [16] proposed a approach based on heterogeneous

ISBN :978-81-945631-7-4

128
encryption to provide access to different users for resources and also provide
security proof for this.
d) Access control based on Role-It is an identity based system to manage access
to different role players in system [17] [18] [19].
J. Q. Wen, and Hu C. Zhang [17] designed a system consisting of subsystem
for registration and user authentication, client handling and policy handling.
Wang J, Osborn SL [18] designed a role graph model, it group permission
into roles. By assigning role give set of permission to that user and grant ac-
cess.
Sandhu R [19] proposed three tier architecture based on multidimensional
concept ranges from simple one to complex model of RBAC.
e) Access control based on Trust -It is a lightweight authorization mechanism.
It is improved version of basic access control and involves value of trust factor
based on service quality, issues regarding security repudiation and social mat-
ters.
Bernabe, Ramos, Gomez [20] [30] [31] proposed access control system which
is multidimensional trust aware.

6 Summary

Analysis of all previous Hierarchical access control methodologies show that it is very
established area for research but still lot many things need to be unfolded. There is
much scope in development for efficient key management scheme to lower down
memory cost, computation cost, and communications cost and consider security aspects
like confidentiality, integrity and availability.

References
1) S. Zhu, S. Setia, S. Xu, and S. Jajodia, “GKMPAN: an efficient group rekeying scheme for
secure multicast in ad hoc networks,” Technical Report, 2004

2) M. Moharrum, R. Mukkalamala, and M. Eltoweissy, “Ckds: an efficient combinatorial


key distribution scheme for wireless ad hoc networks,” IEEE International Conference on
Performance, Computing, and Communications (IPCCC), pp. 631-636, 2004.

3) T. Kaya, G. Lin, G. Noubir, and A. Yilmaz, “Secure multicast groups on Ad Hoc net-
works,” in Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Net-
works, pp. 94-102, 2003

4) L. Lazos and R. Poovendram, “Energy- aware secure multicast communication in Ad Hoc


networks using geographical location information,” in IEEE International Conference on
Acoustics Speech and Signal Processing, pp. 201-204, 2003

ISBN :978-81-945631-7-4

129
5) R. D. Pietro, L. Mancini, Y. Law, D. Etalle, and P. Havinga, “LKHW: A directed diffu-
sion based secure multicast scheme for wireless sensor networks,” in International Confer-
ence on Parallel Processing Workshops (ICPPW‟03), pp. 397-406, Oct. 2003.

6) M. S. Bouassida, I. Chrisment, and O. Festor, “An enhanced hybrid key management


protocol for secure multicast in Ad Hoc networks,” in Networking 2004, Third Interna-
tional IFIP TC6 Networking Conference, LNCS 3042, pp. 725-742,Springer, May 2004.

7) M. S. Bouassida, I. Chrisment, and O. Festor, “Group Key Management in MANETs” In-


ternational Journal of Network Security, pp. 67–79, Jan. 2008.

8) V. Varadharajan, M. Hitchens, and R. Shankaran, “Securing NTDR Ad-Hoc Networks,”


in IASTED International Conference on Parallel and Distributed Computing and Systems
2001, pp. 593-598,

Aug. 2001.
9) T. Chiang and Y. Huang, “Group keys and the multicast security in Ad Hoc networks,” in
Proceedings of the 2003 International Conference on Parallel Processing Workshops
(ICPP 2003 Workshops), pp. 385, 2003.

10) I. Ingemarson, D. Tang, and C. Wong, “A conference key distribution system,” IEEE
Transactions on Information Theory, pp. 714-720, Sep. 1982.

11) B. Madhusudhanan, S. Chitra, and C. Rajan, “Mobility based key management technique
for multicast security in mobile ad hoc networks,” The Scientific World Journal, 10 pages,
2015.

12) M. Steiner, G. Tsudik, and M. Waidner, “CLIQUES: A new approach to Group Key
Agreement,” Proceedings of ICDCS'98, 1998

13) A. EL-Sayed, A new hierarchical group key management based on clustering scheme for
mobile ad hoc networks,” International Journal of Advanced Computer Science and Ap-
plications, pp. 208-219, 2014.

14) Kaiwen,S.,Lihua,Y., “Attribute role based hybrid access control in internet of things,” In
web technologies and application, pp 333-343 Springer,2014

15) Touti,l.,Challal,Y., “Activity based access control for IoT.,Proceeding of first International
Workshop on experiences with the Design and Implementation of smart objects,
ACM,2015

16) Li,F Han ,Y.,Jin,C. , “Practical access control for sensor network in the context of IoT” ,
Computer Communication,2016

17) Hu, C., Zhang, J Wen, Q, “An identity based personal location system with protected pri-
vacy in IoT”, IC-BNMT, 2011

18) Wang J, Osborn SL. A role-based approach to access control for XML databases. In:
SACMAT’04: Proceedings of the 9th ACM Symposium on Access Control Models and
Technologies. ACM Press; 2004. p. 70-77

ISBN :978-81-945631-7-4

130
19) Sandhu R. Role-based access control. In: Advances in computers. Academic Press;

1998. p. 238-87.
20) Bernabe,JB ,Ramos,J.L.H.,Gomez,A.F.S, “Multidimentinal trust aware access control sys-
tem for the IoT .Soft computing pp 1-17,2017

21) Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci Francesco Palmieri,, Aniello
Castiglione Xinyi Huang,”Cryptographic Hierarchical Access Control for Dynamic Struc-
tures”IEEE transaction june 2016

22) Y.-F. Chang, “A flexible hierarchical access control mechanism enforcing extension poli-
cies,” Security and Communication Networks, vol. 8, no. 2, p189–201, 2015.

23) E. S. V. Freire, K. G. Paterson, and B. Poettering, “Simple, Efficient and Strongly KI-
Secure Hierarchical Key Assignment Schemes,” in Topics in Cryptology - CT-RSA 2013
- The Cryptographers’ Track at the RSA Conference 2013, San Francisco, A, USA, Febru-
ary 25-March 1, 2013. Proceedings, ser. Lecture Notes in Computer Science, E. Dawson,
Ed., vol. 7779. Springer, 2013, pp. 101–114.

24) J. Lo, M. Hwang, and C. Liu, “An efficient key assignment scheme for access control in a
large leaf class hierarchy,” Inf. Sci., vol. 181, no. 4, pp. 917–925, 2011

25) M. S. Bouassida, I. Chrisment, and O. Festor, “Group Key Management in MANETs” In-
ternational Journal of Network Security, pp. 67–79, Jan. 2008

26) M. S. Bouassida, I. Chrisment, and O. Festor, “An enhanced hybrid key management pro-
tocol for secure multicast in Ad Hoc networks,” in Networking 2004, Third International
IFIP TC6 Networking Conference, LNCS 3042, pp. 725-742,Springer, May 2004

27) B. Madhusudhanan, S. Chitra, and C. Rajan, “Mobility based key management technique
for multicast security in mobile ad hoc networks,” The Scientific World Journal, 10 pages,
2015

28) Jeddy Nafeesa Begum, Krishnan Kumar, Vembu Sumathy,“Implementing Hierarchical


Access Control in Organizations using Symmetric Polynomials and Tree Based Group
Diffie Hellman Scheme,” Advances in Information Science and Applications - Volume II,
pp. 645-651, 20042016

29) Yuanpeng Xie, Hong Wen, Bin Wu, Yixin Jiang and Jiaxiao Meng, “A Modified Hierar-
chical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing ,”
IEEE Transaction, 2014,pp 1-9

30) k. Pradeep V. Vijayakumar and V. Subramaniyaswamy , “An Efficient Framework for


Sharing a File in a Secure Manner Using Asymmetric Key Distribution Management in
Cloud Environment” Journal of Computer Networks and Communications Volume
2019, 1-8 pages

31) Matthew Campagna, and Shay Gueron “Key Management Systems at the Cloud
Scale”www.mdpi.com/journal/cryptography, Volume 2019, 1-16

ISBN :978-81-945631-7-4

131
Research Contribution on Hierarchical access control approach

Title/Source Description Methodol- Relevant Find- Limitation/Fu- Comparative/Parame-


/Purpose ogy ing/Outcome ture Work ters
Arcangelo Define the con- Used sym- Security with re- Can do smaller num- Confidentiality-yes
Castiglione, Alfredo cept of Hierarchical metric encryption spect to key indistin- ber Integrity-yes
De Santis, Barbara key assignment key and TLEBC guishability and key re- Of local update to
Availability-yes
Masucci Francesco scheme supporting two level encryp- covery the public information
Palmieri,, Aniello dynamic updates, for- tion based con- after a dynamic update Dynamic-Yes
Castiglione Xinyi malizing relative se- struction(Distrib- Security-Good
Huang,”Crypto- curity model. uted)
Robustness-Yes
graphic Hierarchical
Storage cost-for key and pub-
Access Control for
lic information
Dynamic Struc-
tures”IEEE transac- Communication cost-less
tion june 2016[21] since No redistribution of key
Reliability-yes
Scalability-Yes
Computation cost-less
Forward secrecy-yes
Backward secrecy-yes
Scalability-Good
Y.-F. Chang, “A Design hierarchy Used elliptic Security by transi- public parameter is Confidentiality-yes
flexible hierarchical access control system key cryptography tive exception and anti recommended to be at Integrity-yes
access control mech- also support dyna- and two layer symmetric arrange- least 256 bit to Availability-yes
anism enforcing ex- mism hash func- ment ensure both security
tion(centralized) and computation effi- Dynamic-Yes
tension policies,”
ciency Security-Good
Security and Com-
munication Net- Robustness-Yes
works, vol. 8, no. 2, Storage cost-for key and pub-
p189–201, lic information since ECC
2015.[22] Communication cost-less
since No redistribution of key
Reliability-yes
Scalability-Yes
Computation cost-less
E. S. V. Freire, Design hierarchy simple, effi- KI-security notion This schemes Confidentiality-yes
K. G. Paterson, and access control system cient, and introduced earlier is having a trade-off
B. Poettering, “Sim- based on strongly-secure Strengthen in order between storage of pri- Integrity-yes
ple, Efficient and chain partitioning constructions for to capture the widest vate information and ef- Availability-fair
Strongly KI-Secure method Hierarchical Key possible range of real- ficiency of key deriva- Dynamic-yes
Hierarchical Key Assignment istic attacks. tion,
Security-Good
Assignment Schemes for arbi- Depending on how
trary hierarchies the poset is partitioned Robustness-Yes
Schemes,” in Topics
in Cryptology - CT- using pseudoran- into chains. The overall Storage cost-private storage
RSA 2013 - The dom functions efficiency of key required but not public
Cryptographers’ and forward- derivation is Communication cost-less
Track at the RSA secure pseu- bounded by the length Reliability-yes
dorandom of the longest chain in
Conference 2013,
Scalability-Yes

ISBN :978-81-945631-7-4

132
San Francisco, A, generators(Dis- the partition, and the Forward secrecy-yes
USA, February 25- tributed) amount Backward secrecy-yes
March 1, 2013. Pro- of private infor-
ceedings, ser. Lec- mation depends on w, Scalability-Fair
ture Notes in Com- the poset width (which
puter Science, E. is equal to the number
Dawson, Ed., vol. of chains in the par-
7779. Springer, tition). Moreover, due to
2013, pp. 101– the cryptographic com-
114.[23] ponents used in
our constructions
(PRFs and FS-PRGs),
key derivation is rela-
tively efficient, growing
Linearly in h, the
number of levels be-
tween classes. In addi-
tion, our constructions
require
no public storage.
J. Lo, M. Hwang, proposed a new The computational The number of the Confidentiality-yes
and C. Liu, “An effi- key assignment complexity of the key selected prime numbers Integrity-yes
cient key assignment scheme for control- generation is usually in the system affects the Availability-fair
scheme for access ling Key deriva- proportional to the storage space of data,
control in a large leaf the access right in tion formula is number of primes. The the key generation time Dynamic-No
class hierarchy,” Inf. a large POSET (par- used computational and key derivation time. Security-Good
Sci., vol. 181, no. 4, tially ordered set) hi- complexity of this This scheme has a rela-
pp. 917–925, erarchy to reduce the scheme is the most effi- tively small amount of Robustness-Yes
2011.[24] required computation cient comparing with the prime numbers. Storage cost-private storage
for key generation other schemes. required but not public
and derivation with Key genera- The storage space Communication cost-less
the storage amount of tion formula is of secret key depends
data decreased. used on the access method. Reliability-yes
Both Akl–Taylor’s and Scalability-Yes
Harn–Lin’s schemes
assign the public Forward secrecy-yes
parameters directly, Backward secrecy-yes
Public pa- so that each class rec-
rameter Scalability-Yes
ords its own key and its
(Distributed) successors’ keys. but in
this only one key need
to store
M. S. Bouassida, Group key man- BALADE is completely To improve the per- Confidentiality-yes
I. Chrisment, and O. agement based on eliminating the formance of BALADE, Integrity-yes
Festor, “Group Key protocols for se- the dynamic overhead induced by we plan to Availability-fair
Management in MA- curing multicast com- clustering ap- the intermediate en- carry out the reliabil-
NETs” International munications in proach, using one cryption ity of the keys distribu- Dynamic-yes
Journal of Network ad hoc networks, traffic encryption and decryption op- tion process, Security-authentication, ac-
Security, pp. 67–79, considering the char- key, and sev- erations on the mul- in ad hoc environ- cess control, data confidentiality
Jan. 2008[25] acteristics and the cri- eral key encryp- ticast flow, ment, where the packets Robustness-Yes
teria of such environ- tion keys(Decen- while attenuating loss rate is not negligi-
Storage cost-public and pri-
ment, which are tralized) the “1 affects n” phe- ble. vate key, activities of LCs
nodes mobility nomenon. BALADE Communication cost-key
support, energy uses the OMCT (Opti- generation message and messages
efficiency and multi- mized Multicast Clus- to LCs
hop awareness. ter Reliability-yes

ISBN :978-81-945631-7-4

133
Tree) algorithm to Scalability-Fair
ensure an efficient and
fast group key delivery, Forward secrecy-fair
taking into account the Backward secrecy-fair
localization and the
mobility of nodes, Scalability-fair
and optimizing energy Efficiency-poor
and bandwidth
M. S. Bouassida, This protocol is Based on Lack of infrastruc- Still there are Relia- Confidentiality-yes
I. Chrisment, and O. enhanced architecture BAAL include ture and trust problem bility issue Integrity-fair
Festor, “An en- of BAAL which is threshold cryp- solved by threshold Availability-fair
hanced hybrid key valid for wired net- tography and cryptography
management proto- work AKMP Adaptive AKMP ensure Dynamic-yes
col for secure mul- Key management scalability and dy- Security-Good
ticast in Ad Hoc net- algorithm namicity Robustness-Yes
works,” in Network-
ing 2004, Third In- Storage cost-ACL, revoca-
ternational IFIP TC6 tion list and KEK per cluster
Networking Confer- Communication cost-OMCT
ence, LNCS 3042, group distribution
pp. 725- Reliability-no
742,Springer, May Scalability-Fair
2004[26] Forward secrecy-yes
Backward secrecy-yes
Scalability-Fair
Efficiency-Fair
B. Madhusudhanan, proposed the mo- Initially, the Session key based Group size increases Confidentiality-yes
S. Chitra, and C. Ra- bility based key man- nodes are catego- Encryption tech- control overhead in-
Integrity-yes
jan, “Mobility based agement technique rized according nique is utilized to creases
for multicast to their stability transmit a multicast Availability-fair
key management
Security in index which is data. The rekeying pro- Dynamic-yes
technique for mul-
ticast security in mo- MANET. estimated based cess is performed peri- Security-Good
bile ad hoc net- . on the link odically by the initiator Robustness-Yes
works,” The Scien- availability node The rekeying
Storage cost-ACL, revoca-
and mobility interval is fixed de-
tific World Journal, tion list and KEK per cluster
pending on the node
10 pages, 2015.[27] Communication cost-routing
category so that this
technique greatly mini- of all messages by CHs based on
mizes the rekeying reputation index
Reliability-achieved by peri-
overhead.
odic flooding
Scalability-good
Forward secrecy-yes
Backward secrecy-yes
Scalability-Fair
Efficiency-Fair
Computation complexity-
more number of encryption and
decryption
Jeddy Nafeesa Proposed dual en- Dual encryp- Proposed method Mainly focuses on Confidentiality-yes
Begum, Krishnan cryption algorithm to tion key one is manages information only interclass commu- Integrity-yes
Kumar, Vembu Su- implement Hierar- symmetric poly- and resources in a effi- nication Availability-fair
mathy, chical access control nomial and cient manner and scale Dynamic-yes

ISBN :978-81-945631-7-4

134
“Implementing using a software another is Tree well for large number Security-Good
Hierarchical Access agent based group Dif- of employee arranged Robustness-Yes
Control in Organiza- fie Hellman key under hierarchy and Storage cost-reduced
tions using Symmet- also decreases commu-
Communication cost-re-
ric Polynomials and nication cost and com-
duced
Tree Based Group putation time since
Reliability-achieved
Diffie Hellman modular approach
Scheme,” Advances Scalability-good
in Information Sci-
ence and Applica- Forward secrecy-yes
tions - Volume II, Backward secrecy-yes
pp. 645-651,
20042016 [28] Scalability-Fair
Efficiency-Fair
Computation complexity-
more encryption and decryption

ISBN :978-81-945631-7-4

135
A Review Identifying Effects of Minimum Quantity Lu-
brication (MQL) in Turning Process Using Conventional
Fluids and Nano Fluids
Vijay Teli1 and KedarInamdar2
1PG Student, 2Professor, Mechanical Engineering Department, Walchand College of Engineer-
ing, Sangli, Maharashtra, India
vijay.teli@walchandsangli.ac.in

Abstract. Government norms are becoming more stringent, and an increase in


public awareness about the environment is forcing manufacturing companies to
move towards sustainable production. Today, many companies are adopting
new techniques and practices to be environmentally friendly. Traditionally
manufacturing companies have extensively used various types of cutting fluids
for machining purpose to fulfill the requirements such as accuracy, productivi-
ty, good surface finish, and less tool wear. In recent investigations performed by
researchers, major modifications have been suggested by them to eliminate
these negative effects, with the introduction of minimum quantity lubrication
(MQL) being an important strategy. This paper gives a review of the relevant
published research papers on the MQL based use of vegetable oils, nano-fluids,
supercritical oil-based cutting fluids for turning operation. The paper discusses
the principle of the MQL technique along with different types of spraying sys-
tems. The present work also addresses the impact of MQL on different materi-
als with various cutting fluids. Most of the authors have proved with the help of
experiments that MQL produces better-finished surfaces than dry turning and
similar or sometimes better surface finish than wet turning. MQL application
has also managed to reduce cutting force, cutting temperature, friction when
compared with dry and wet turning. Therefore, the MQL technique has emerged
as a reasonable solution for environmental and health issues.

Keywords:MQL, Turning, Nano-Fluid, Vegetable Oil, Surface Roughness.

1 Introduction

Machining is a mechanical forming operation in which a piece of raw material is cut


into the desired size and shape by using sharp cutting tools. In this process the desired
shape, size and surface roughness are bought by removing excess material. The raw
material used in machining is called workpiece and, the device which is used to sepa-
rate the excess material from that raw material is referred to as a cutting tool. The
removal of excess material is achieved by relative motion between the cutting tool
and workpiece. The machine tool holds one or more cutting tools, facilitates the oper-
ator to use the desired tool for specific machining operation and provides the required
relative motion with sufficient force. When cutting tool tries to shear workpiece mate-

ISBN :978-81-945631-7-4

136
rial, at the point of shearing metallic bond breaks and bonding energy converts into
heat energy. The damage of microstructure has observed due to the excessive heat
generated.The excessive heat generated can damage the microstructure of the work-
piece material. Also, excessive heat affects the surface finish of the workpiece. To
reduce, the heat and friction the cutting fluids perform a very vital
role.Additionallycutting fluids works as a lubricant at tool-chip frictionpoint,results in
better tool life and increased surface finish ofthe workpiece.Every time the cutting
fluid is applied with sufficient pressure; this helps in keeping the cut chips aside from
the cutting zone.However, there are still some disadvantages to the usage of cutting
fluids, viz.cutting fluids adds cost in machining,and mostof them are not bio-
degradable and adds risk to thelabours at the machine shop [1].
In the year 2015 demand of lubricants was around 40 million tons worldwide,
which may reach up to around44 million tons in 2022. The field of industrial lubri-
cants can be split into several sections such as gear lubricant oils, hydraulic oils, and
engine lubricating oils. Currently cutting fluids utilize 5% lubricants and Asia is a top
consumer of cutting fluids [2].

1.1 Cost of Cutting Fluids

Machining includes many costs such as tool changing cost, maintenance cost, the
cost for, location, the cost for waste, energy cost, etc. till the manufacturer reaches to
the finished workpiece. R. Avila notes that cutting fluids contribute to approximately
17% of the cost of machining whereas 4% cost is spent on tooling [3].

1.2 Safety and Health of Labours

The Health and Safety Executive is aGoverning body from the United Kingdom is
responsible to promote, govern and implement the health, safety and welfare of the
workforce and research into occupational hazards in the UK. Health concerns includ-
ing breathing problems, skin problemsmayoccur if the cutting fluids were managed
improperly [4].

1.3 Effects on the Environment

The process where CFs are disposed of has the largest environmental effects. The
disposal of cutting fluids affects the environment in different ways such as these fluids
carries harmful metals and chemicals along with them, reduces oxygen levels in the
water and also contains fat, grease from petroleum.

Harmful Metal.Initially cutting fluids are not contaminated with metal constituents
but, after used of these fluids they contain metal constituents along with them, these
fluids become harmful in many aspects because they contain heavy metals which may
cadmium, lead, chromium etc. The cost of disposing-off these fluids increases due to
the harmful metal contaminants.

ISBN :978-81-945631-7-4

137
Harmful Chemicals.Every cutting fluid contains at least one property out of combus-
tible, toxic, reactive and corrosive. Hence these fluids are potentially harmful to la-
bours and also when these properties are beyond a threshold value, they include envi-
ronmentally harmful chemicals. Hence these fluids need to be disposed of properly as
per the standard operating procedure.

Biological Oxygen Demand.When the used cutting fluid is discharged in waters of a


pond, lake, river, ocean or other such ecosystems the bacterial pollution will consume
the oxygen present in the water. As the present oxygen from water is used up; it will
cause an imbalance of oxygen in that ecosystem and may result in less availability of
oxygen to the organism in the ecosystem. If the concentrations of dissolved oxygen
decrease considerably, the organisms will not live any more survive and the ecosys-
tem of the water will affect. To measure this form of contamination, the biological
oxygen demand (BOD) of a cutting fluid is measured, the unit for BOD is mg/l.

Fat, oil, and grease (FOG).Fat, oil, and grease (FOG) are the contaminants present
in cutting fluids come from petroleum, vegetable or mineral sources. This FOG con-
tributes totaste, odour, and other appreciative problems in the water at comparatively
low concentrations. At high concentrations, these fat, oil, and grease contents are
hazardous to aquatic species [5].

Weinert et al. [6] have found the usage of cutting fluids has a serious impact on the
environment and operator health while using for machining and at disposal state.
Sreejith and Ngoi [7] have summarized that there should be no unnecessary use of
these cutting fluids. In addition to traditional cooling techniques, in recent years, sev-
eral other innovations have been introduced to extract heat of the cutting area. Sharma
et al. [8] examined multiple cooling methods for managing the temperature of the
cutting zone, including flood cooling, cryogenic cooling, minimum quantity lubrica-
tion (MQL), coolants with high pressure, solid lubricants, and compressed air/gas
coolants. They observed the machining costs and volume of lubricants can be signifi-
cantly reduced while maintaining the surface finish in a good range. Lawal et al. [9]
also reviewed various cooling techniques in the processes of machining and investi-
gated the impact of MQL using lubricants based on vegetable oil. Lawal et al. con-
cluded that the MQL technique is much better than other techniques.

2 Minimum Quantity Lubrication Technique

Minimum quantity lubrication (MQL) is a technique, in which a very small amount of


coolant is mixed with pressurized air to form the air-fluid mixture, which is then
sprayed at the cutting zone using nozzle at high pressure. Two different methods have
been adopted for spraying the mixture of coolant (aerosol) with the air: spraying the
aerosol from inside the tool and spraying the aerosol from outside the tool. Figure 1
tries to explain the major difference between these two. Both systems have their ad-
vantages and disadvantages. Outside the tool spraying system is simple in construc-
tion, comes with less cost but its reach is limited at cutting zone and may provide

ISBN :978-81-945631-7-4

138
shadowing effect of spray jet during machining. On the other hand inside the tool
system requires high investment cost, special tools and provides optimal lubrication at
the cutting point without spray loss. Operations such as drilling give better results
from inside spraying and other operations such as turning, milling gives better results
when the aerosol is supplied from outside.

(a) (b)
Fig. 1.(a)Inside the tool and (b) outside the tool spraying system.

According to many researchers, MQL uses a small amount of lubricant flow


(ml/hr. instead of l/min.). For example, according to Tschätsch [10] MQL uses cutting
fluid at the rate of approximately 20 ml/hr. MQL combines the advantages of dry and
wet machining also. It reduces the cost of CFs, cost of disposing CFs, gives cleaner
machine and workplace and also chips remains dry these advantages of dry machining
along with the better surface finish, low heat generation at cutting zone are ad-
vantages of wet machining.

ISBN :978-81-945631-7-4

139
3 Turning Process using MQL Technique
D.V. Lohar and C.R. Nanavaty [11]investigated the effect of turning on AISI 4340 steel by
applying commercially available cutting fluid where they found a 40% decrease in cutting
forces using MQL technique when compared with drylubrication and wet lubrication tech-
niques. Additionally found a 36% decrease in cutting temperature and 30% better surface fin-
ish. In turning of Inconel 750 with supercritical CO2 Stephenson D. et al. [12] concluded that
by using supercritical CO2 MQL has increased material removal rate (MRR) by 40% and in-
creased the tool life under some machining conditions compared to flood coolant.

Table 1.Table captions should be placed above the tables.

Authors Workpiece Cutting fluids Cutting Feed MQL fluid Response


Material speed (mm/rev.) pressure (bar) Variables
(m/min.) and Depth of and flow rate
cut (mm) (ml/hr.)
D.V. AISI 4340 Commercially 40, 80, 120 0.05, 0.075, 6 and 10, 20 Cutting
Lohar available 0.1 and 0.1, forces,
and C.R. cutting fluid 1 Cutting
Nanav- tempera-
aty ture
(2013)

Stephen- Inconel Supercritical 45.70, 48.75, 0.20, 0.25, ! and ! Material


son D. et 750 CO2 50.30 0.30 and 3.0 removal
al. (SMM) rate
(2014) (MRR),
Tool wear
Su Y. et AISI 1045 Vegetable oil, 55, 96 0.1 and 1.0 5 and 7.5 Viscosity,
al. steel bar Ester oils and Surface
(2016) both with tension,
addition of Wettabil-
nano- fluids ity,
Thermal
conduc-
tivity,
Cutting
tempera-
ture and
Cutting
force
Babu M. AISI D3 Coconut oil, 500, 1000 0.03, 0.08, 2 and 8 Surface
N. et al. Steel Graphene 0.13 and rough-
(2019) Nano-fluid 0.75, 1, 1.5 ness,
cutting

ISBN :978-81-945631-7-4

140
tempera-
ture, Tool
wear and
Chip
morphol-
ogy
Patole P. AISI 4340 Ethylene 90 0.06 and 1 3, 4, 5, 6 and Surface
B. and glycol with 80, 140, 300, roughness
Kulkarni nano fluid, 500
V. V. Water with
(2018) nano fluid
Gunjal AISI 4340 Canola oil, 200, 220, 240 0.1 and 0.25 6 and 50 Surface
S. U. Coconut oil, rough-
and Patil Soyabean oil ness, Tool
N. G. life
(2018)
Pereira AISI 304 Canola oil 225 0.25 and 1.5 6, 15 and 100 Tool life
O. et al. with biode- behavior,
(2016) gradable Cutting
additives forces,
Surface
integrity
Joshi K. Inconel vegetable oil, 60, 80, 100 0.08, 0.12, 5 and 60 Surface
et al. 600 Vegetable oil 0.16 and 0.5, roughness
(2018) with nano 0.75, 1
particles
Mia M. hardened VG-68 grade 132, 163, 201 0.18, 0.22, ! and ! Surface
et al. and tem- straight cut 0.25 and roughness
(2018) pered high cutting oil 0.25, 0.5
carbon
steel
Carou UNS r.rhenus 200 0.1, 0.2 6 and 30 Surface
D. et al. M11917 NOR SSL and0.25 roughness
(2016) magnesium cutting fluid
alloy
Sartori alpha-beta Vegetable 80 0.2 and 0.25 7 and 200, Tool wear
S. et al. Ti6Al4V oil 4000 and Sur-
(2017) ELI titani- face in-
um alloy tegrity
Suresh AISI D3 Castor oil, 100, 150, 200 0.05, 0.07, ! and 300 Surface
R. et al. steel Palm oil, 0.09 and 1, rough-
(2016) Ground nut 1.5, 2 ness,
oil MRR,
Specific
energy for

ISBN :978-81-945631-7-4

141
CVD tool
Sharma AISI D2 SAE20W40 51, 78, 123 0.10, 0.15, 5, 6, 7 and ! Tempera-
P. et al. steel oil, .020and ! ture,
(2015) SAE20W40 Surface
oil with roughness
nanoparti-
cles
! Not mentioned

Su Y. et al. [14] examined the effects of vegetable oil, ester oils and both the oils with
the addition of nano-fluids on AISI 1045 steel bar and observed use of graphite oil-
based nano-fluid MQL decreased the cutting forces and cutting zone tempera-
ture.Using coconut oil and nano-fluid on AISI D3 steelBabu M. N. et al. [15] have
observed a decrease in surface roughness 85% than dry and 45% than oil cutting in
graphene nano-fluid MQL and decrease in cutting temperature 53% with dry cutting
and 32% with a wet cutting condition in graphene nano-fluid MQL condition. Patole
P. B. and Kulkarni V. V. [16] evaluated the performance of ethylene glycol with
nano-fluid and water with nano-fluid while turning AISI 4340 and concluded nano-
fluid executed a significant role in offering lower surface roughness, ethylene glycol
with nano-fluid proved much less surface roughness as correlated to water with nano-
fluid. Gunjal S. U. and Patil N. G. [17] have observedthe MQL technique used with
canola oil, gave better lubricating effect when used on AISI 4340 steel that coconut
oil andsoyabean oil. Table 1 sums the features of investigations on MQL in turning.

4 Conclusions

The theme of this paper is the analysis of important research available in the use of
the MQL technique during the turning process by using conventional cutting oils,
cutting oils made from vegetable oils, and nano-fluid based cutting fluids. It has also
given detailed information about the MQL system and has discussed its impact on the
finished workpiece in the turning process. The majority of the literature proved that
MQL turning is a better option instead of wet machining and also facilitates environ-
ment-friendly machining. From this literature review, the below-mentioned conclu-
sions can be drawn:

• Because of using very less quantity of cutting fluids, MQL saved much cost which
gets incurred during machining and during disposal of cutting fluids.
• The better surface roughness and much less tool wear can be obtained by reducing
cutting zone temperature by the efficient application of the MQL technique.
• Use of MQL technique is helped in decreasing in cutting forces.
• It is found that Supercritical CO2 MQL has increased material removal rate (MRR)
by 40% and enhanced the tool life.

ISBN :978-81-945631-7-4

142
References
1. Astakhov V., Ecological Machining: Near-dry Machining, Davim J. (Ed.), Machining
Fundamentals and Recent Advances. Springer, University of Aveiro,Aveiro, Portugal,
195-224, (2008).
2. Benedicto E., Carou D. and Rubio E., Technical, Economic and Environmental Review of
the Lubrication/Cooling Systems Used in Machining Processes, Procedia Engineering,
184, 99-116, (2017).
3. Avila R. and Abrao A. The effect of cutting fluids on the machining of hardened AISI
4340 steel, Journal of Materials processing Technology, 119, 21-26, (2001).
4. HSE and metalworking fluids, https://www.hse.gov.uk/metalworking/hse.htm#,last ac-
cessed 2019/12/09.
5. Skerlos S., Prevention of Metalworking Fluid Pollution: Environmentally Conscious Man-
ufacturing at the Machine Tool, M. Kutz, (Ed.) Environmentally Conscious Manufacturing
at the Machine Tool, John Wiley & Sons, Inc., Canada, 95-122, (2007).
6. Weinert K., InasakiI.,Sutherland, J. W. and Wakabayashi T., Dry Machining and Mini-
mum Quantity Lubrication, 53(2), pp. 511-537 (2004).
7. Sreejith P.S. and Ngoi B., Dry machining: Machining of the future, 101(1-3), pp. 287-291
(2000).
8. Sharma V. S., Dogra M. and Suri N. M., Cooling techniques for improved productivity in
turning, 49(6), pp. 435-453 (2009).
9. Lawal A., Choudhary I. and Nukuman I., A critical assessment of lubrication techniques in
machining processes: a case for minimum quantity lubrication using vegetable oil-based
lubricant, 41, pp. 210-221 (2013).
10. Tschätsch H., Applied Machining Technology, 8th edition, Springer Dordrecht Heidelberg
London New York, (2009).
11. Lohar D. and Nanavaty C., Performance Evaluation of Minimum Quantity Lubrication
(MQL) using CBN Tool during Hard Turning of AISI 4340 and its Comparison with Dry
and Wet Turning, Bonfring International Journal of Industrial Engineering and Manage-
ment Science, 3, 102-106, (2013).
12. Stephenson D., Skerlos S., King A. and Supekar S., Rough turning Inconel 750 with su-
percritical CO2-based minimum quantity lubrication, Journal of Materials Processing
Technology, 214, 673-680, (2014).
13. Suresh R.K., KrishnaiahG. and VenkataramaiahP., An Experimental Investigation with
Minimum Quantity Lubrication and its Comparison with Various Vegetable Oil Based
Cutting Fluids during Turning, Materials Today: Proceedings 4, pp. 8758-8768 (2017).
14. Su Y., Gong L., Li B., Liu Z. and Dandan C., Performance evaluation of nano-fluid MQL
with vegetable-based oil and ester oil as base fluids in turning, International Journal of
Advanced Manufacturing Technology, 83, 2083-2089, (2016).
15. Babu M. N., Anandan V., Muthukrishnan N., Arivalagar A. and Babu M. D., Evaluation
of graphene based nanofuids with minimum quantity lubrication in turning of AISI D3
steel, Springer Nature Applied Sciences, 1, (10), (2019).
16. Patole P. B. and Kulkarni V. V., Parametric Optimization Of Minimum Quantity Lubrica-
tion In Turning Of AISI 4340 Using Nano Fluids. In: International Conference on Materi-
als Manufacturing and Modelling, pp. 12419–12425,Materials Today: Proceedings,
(2017).
17. Gunjal S. U. and Patil N. G., Experimental Investigations into Turning of Hardened AISI
4340 Steel using Vegetable based Cutting Fluids under Minimum Quantity Lubrication.

ISBN :978-81-945631-7-4

143
In: 2nd International Conference on Materials Manufacturing and Design Engineering, pp.
18-23, Procedia Manufacturing, (2018).
18. O. Pereira, A. Rodríguez, A.I. Fernández-Abia, J. Barreiro and L.N. López de Lacalle,
Cryogenic and Minimum Quantity Lubrication for an Eco-Efficiency Turning of AISI 304,
139, pp. 440-449, (2016).
19. Joshi K. K., Behera R. K., Anurag, Effect of minimum quantity lubrication with Al2O3
Nanofluid on Surface Roughness and its prediction using hybrid fuzzy controller in turning
operation of Inconel 600, Materials Today: Proceedings 5, pp. 20660–20668, (2018).
20. Mia M., Morshed M.S., MdKharshiduzzaman, Mashrat H. Razi, Mostafa M. R., Rah-
manM.S., Ahmad I., Hafiz M. T. and Kamal A. M., Prediction and optimization of surface
roughness in minimum quantity coolant lubrication applied turning of high hardness steel,
Measurement 118, pp. 43-51 (2018).
21. Carou D., Rubio E.M., Lauro C.H. andDavim J.P., The effect of minimum quantity lubri-
cation in the intermittent turning of magnesium based on vibration signals, 94, pp. 338-343
(2016).
22. Sartori S., Ghiotti A. andBruschi S., Solid Lubricant-assisted Minimum Quantity Lubrica-
tion and cooling strategies to improve Ti6Al4V machinability in finishing turning, 118, pp.
287-294 (2018).
23. Sharma P., Sandhu B. S. and Sharma J., Investigation of effects of Nanofluids on turning
of AISI D2 Steel using Minimum Quantity Lubrication, 108 (part A), pp. 72-79 (2015).

ISBN :978-81-945631-7-4

144
Microgrid-A Future Energy Solution: Review

Rahul Kumar 1, Pratibha Tiwari 2, Nisheet Soni 3

1,2
Master Candidate,1 Jabalpur Engineering College,
Jabalpur, Madhya Pradesh – 482005, India
3
Asst. Professor, 1 Jabalpur Engineering College,
Jabalpur, Madhya Pradesh – 482005, India

Abstract. Microgrid is proving to be a probable solution for power crisis in to-


day’s scenario as compared to the traditional technologies like thermal power
stations. Microgrid is basically a smaller independent power grid or also called
remote grid, which is useful for distributing power to remoteareas that have lim-
ited or no access to the power supply such as rural areas, isolated lands. It is also
being employed for commercial and residential areas.Microgrid is an intercon-
nected system of all kind of renewable energy resources like tidal energy, solar
energy, batteries (photovoltaic cells) with combination of newer smart technolo-
gies. We can say microgrid is a subset of large power grid.This paper presents
multidisciplinary representation of the microgrid, its characteristics, specific ad-
vantages and future aspects for clean and green energy.

Keywords: microgrid control and management, renewable energy sources, grid-tie in-
verter.

1 Introduction
Microgrid is a micro model of the traditional energy grid. It has connection with the utility grid
by using a switch such that whenever any power disruptions occur on the main grid, the switch
disconnects the utility grid and the micro grid and maintains to deliver energy to the units (or
customers) linked to the micro grid. Thus, micro grids are useful for power distribution in emer-
gency cases as they can switch between on-grid and off-grid modes.[17]
Micro grid is an combined resources of those energy resources which can be renewable and su-
perior technology which distribute energy to the faraway regions having limited or no access to
power supply. It can also be used in cities, towns, hospitals, army bases and data centres for
emergency or alternative supply.[28]
A formal definition of microgrid is “microgrid is consist of the whole electrical distribution
system containingdistributed generators, distributed energy resources, energystoring devices and
controllable loads which can be controlled and coordinated in a way either in islanding mode or
grid connected mode”.[10]
Islanding means disconnecting from the main grid and working separately to give uninterrupted
power supply to areas connected to microgrid. Microgrids can thus act as a single unit.

ISBN :978-81-945631-7-4

145
By utilising maximum of solar energy and on windy days can utilise wind energy by running the
windmills. They are flexible, efficient, reliable, resilient and affordable and distribute and regu-
late power supply at a much faster rate than the conventional grid technologies. They are a de-
centralised network with integrated energy storage devices, control devices and protection units.
In India, we have Tirupati microgrid region of about 450 MW.[7]

Fig1. General Structure of Microgrid [6]

Viewing the positive aspects of microgrid as an energy solution, we have major issues of
power quality and control and protection unit in the microgrid, which is further discussed.

2 Microgrid Classification

Depending upon the output voltagenatureused for the sensitive load, microgrids are classified as
follows:
a) AC microgridAC microgrid. A, B, C are radial feeders and loads are connected, which
combined together to form the distribution system. The feeders – A & Bare connected
to the micro sources where the sensitive loads are connected. The loads which arenon-
sensitive are not affected by the power quality issues on the grid, that is feeder C.[10]

Fig2: Simple schematic of an ac Microgrid [6]

b) DC MicrogridSome appliances which needs dc power it can be from the battery or by using
rectifier to convert ac to dc like mobile phones,TV, electric vehicle , laptops, etc use dc
power either from rectification of the ac source or from the battery. Eachappliance has an
adapter in which rectifier is embedded which rectify ac to dc to run them or to charge the
battery. The benefits of dc microgrid can be stated as follows:[10]

ISBN :978-81-945631-7-4

146
• Use of inverters in ac microgrid between dc load and dc appliances makes the effi-
ciency of dc microgrid higher.[16]
• In dc microgrid we don’t need tosynchronize utility grid and dc grid and alsoreactive
power compensation is not needed.[16]

DC microgrid has some disadvantages as follows: [13]


• Private dc distribution lines are needed to be laid to use dc microgrid.
• Since in dc supply magnitude remain positive zero crossing is not present therefore
protection becomes difficult.
• Only loads which are dc can be supplied without any conversion of supply.

Fig.3Schematic diagram of low voltage dc Microgrid [6]

Control strategy of micro grid


In traditional power system several problems like voltage and frequency variation, stability
factor, switch gear failure is faced. [4], As traditional power system is large so variation in this
case is not sever, but in micro grid steady and transient characteristics is different because of
imbalance load and the electricity is coming from uncontrollable source like solar cell, wind mills
etc.[15]
A control system must be design to make system reliable and safe.[3] Generally three kind
of control strategy is used to make system more reliable these arereal and reactive power flow
control, since voltage and frequency fluctuate more in small system so voltage and frequency
control also needed and last droop control. [24]
Centralized approach
Centralized approach handles whole system with the help of complex central processing
element, communication which is rather important unit and from farawaycontrol distribution sys-
tem isused, where communication system isconsists of a sensor which sends data to other units.
It is a main central unit, which is collected by decoder and for each control equipment different
signal is generated and send them to controller.[5]Centralized approach is able to adopt the con-
stant power output mode.[2]

ISBN :978-81-945631-7-4

147
A schematic is shown for centrally controlled micro grid. In LV stations controller is in-
stalled. Stability control cost managing function and other different functionalities are included
in this approach. The next controller is LC (load controller) located at Micro source controller
MC. Process of interruption of load like load shedding controls load. Active and reactive power
generated by the MSis controlled by MC Controller.[22]

Fig.4simple diagram ofcentrally controlled Micro grid.[6]

Decentralized Micro grid configuration


IN this micro grid has a connection to main grid, A simple decentralized micro gridstruc-
ture is shown in below fig.5The static transfer switch (STS) used to measures synchronous status,
local voltage and current also PCC voltage and current. This information is given to all other DG
of micro grid. At PCC static transfer switch connects utility grid and the micro grid.From STS
all information of the PCC voltage and current is given to DG.[25]

ISBN :978-81-945631-7-4

148
Fig.5Diagram of DecentralizedControl Scheme.[6]

PCC information is shared between DGs of MG. DG which is close the PCC a communication
link is formed. DG which is closest to PCC will have power calculation block and PLL. When
MG is synchronized with utility grid, voltage and phase angle should reduced so that utility grid
voltage and MG voltage matches, at that time other DGs output is zero.[6]
For predetermined value of voltage and frequency VSI is used, output of inverter can be
adjusted to provide the control over real and reactive power.
Connected mode of microgrid for energy management is of main interest but microgrid is
operatedseparately in island mode. Voltage and frequency counter hold importance.AS shown in
below fig controller are of either power control mode or voltage control mode as maintained
earlier.

ISBN :978-81-945631-7-4

149
Fig.6Control scheme for DGs.[7]
In power control scheme
In power control scheme if any disturbance faced then micro grid can be made to operate
in island mode so connection to main grid is disconnected. Now controllers of DCP’s are now
controlled by modified voltage controller. All other remains controlled by power control mode.
After disturbance is cleared, DCP’s will now again connected to power control mode. [1]

Fig.7 Power inverter control system.[1]


From above fig.7 active and reactive component of current with voltage of inverter terminal
are calculated.Variation in power of micro source lead to error in DC link voltage, this error can
be filtered via PI-1 regulator and PI-2 regulator will controlled the reactive power output.[9]

Voltage control scheme


Modified voltage control technique developed for control of voltage in island mode. Because
of problems associated with load balancing demand and voltage, the power control scheme is not
a good option for controlling the island mode.[5] Voltage is not an important factor to consider,

ISBN :978-81-945631-7-4

150
because the system is not connected to the main grid.Now voltages have to regulate self. So,
output of VSI is regulated by voltage control scheme.

Fig.8 Schematic diagram of Voltage Control Scheme.[5]


I. Issues in microgrid:There can be many issues in the microgrid, especially in the island
mode, as the microgrid is disconnected from the main grid. The microgrid can be separated
from the main grid whenever any power quality issue event occurs in the main grid.[6]
➢ voltage and frequency regulation: in order to maintain the voltage and frequency in an
acceptable range, one or more microsources are needed. In order to restore the mi-
crogrid frequency to the nominal value loads are shed.[17]
➢ Power quality: power quality is maintaining near sinusoidal power distribution at rated
voltage magnitude and frequency and is important in a grid connected microgrid.[14]
it is required to have reactive power compensation to ride through voltage sags and
voltage swells. Adequate harmonic reduction capability is provided so that harmonics
generated by nonlinear loads on the microgrid do not reach the sensitive loads.[6]
➢ Stability and reliability: in the distribution grid, microgrid is connected as a special
power source. So, the interaction between the microgrids will affect the stability as
well as the reliability of the distribution system.[10]
➢ Protection: our primary task is to ensure the safety of the distributed system, whenever
any failure happens in the microgrid. Different networks have different protection
schemes with adaptive tuning function. [26]

II. Microgrid research scenario: many countries in the world carried out their re-
searches in the field of microgrid. Some of the famous researches of the countries like in
US, Japan, Europe are mentioned below:
a) Research in US:
The famous institute of microgrid research inUS, CERTS, proposed the concept of mi-
crogrid. The CERT model consists of loads, small micro sources, power electronic
technologies with capacity less than 500KW. The laboratory of Wisconsin university
has successfully tested this concept. The America’s first microgrid project is the mad
river microgrid underetken by the northern part of the United states of power sys-
tem.[11]

ISBN :978-81-945631-7-4

151
Fig.9: CERTS Microgrid, schematic diagram [11]
b) Research of EU:
In 1998-2002, Europian Union’s 5th framework funded the pioneering research of mi-
crogrid. Athens National University of Science and Technology led this research pro-
gram, including 14 organizations from seven EU member states. [11]

c) Research of Japan:
The reality of increasing energy shortage and load led to the research in Japan.[11]

ISBN :978-81-945631-7-4

152
Fig.10 The Sendai Microgrid [11]

Grid-tie inverter (GTI) is used to implement microgrid systems but these systems are
weak without a grid. GTI needs power from the grid to operate and control.

Fig.11Control on DER unit inverter [13]

In grid-forming control power settings, DER units are followed by another DER units
to maintain output voltage and frequency. These DER units should have a greater po-
tential energy. We thus adopt Droop control strategies to determine the allowable out-
put power according to droop characteristics given parameters that is voltage droop
and frequency droop. [13]

V. Comparative analysis of microgrid technology:

Issues Control Methodology

The most significant factor FACTS devices,


on both the supply and demand harmonic mitigation tech-
side is maintaining power qual- niques, filters, optimization
ity. Power quality is mostly af- Technique, are some of the
fected with the usage of switch- methods to enhance the power
ing devices, power appliances at quality in the microgrid.
an alarming rate.
These devices also start to mal-
function due to poor power
quality.[18]

Power quality issues are Tocontrol the flow of large


mandatory to occur when the amount of line-current in feed-
microgrid is connected to the ers of the grid, basically two
utility grid. Particularly, during techniques are being adopted:
voltage RL feedforward method and the
Sags occuring in the utility flux charge model. These meth-
grid, large amount of line cur- odology are used during volate
rents can flow along distribu- sags.
tion feeders
connecting the microgrid - and
utility grids.[11]

Voltage instability and Grid-Feeding Power Con-


power flow limitations are verter, current control schemes

ISBN :978-81-945631-7-4

153
major concern in regard to the – dq reference frame and reso-
reliability of the power genera- nant controller in stationary ref-
tion scheme.[30] erence frame,
Active
and Reactive Power Control
Loop, these are some methods
to enhance voltage stability.

The conversion, inversion or For uninterrupted power


rectification required in dc or ac transfer in the dc or ac links, and
grids generate the loss to the to maintain the synchronicity of
system, hence, the current flow the grid under varying loads and
gets deteriorated in the house- demands, coordination control
holds or industrial usage. [25] schemes are adopted.

3 Conclusion:
This review paper presents an overall review of the microgrid, its control strategies and
future prospects. Microgrid seems to be an effective energy solution to meet the power de-
mands of the future. Alongwith improving the safety and reliability of the power supply,
microgrid can achieve higher efficiency. With the integration of smart technologies, mi-
crogrid will inevitably become direction of developing intelligence in the upcoming days.

References

1. J. A. Peças Lopes, C. L. Moreira, and A. G. Madureira“Defining Control Strate-


gies for MicroGrids Islanded Operation”,IEEE Transactions on Power Systems,
June 2006.
2. Sun Xiaofenget.al “An Improved Control Method of Power Electronic Converters
in Low Voltage Micro-grid’’ IEEE Conference on Electrical Machines and Sys-
tems, 15 Nov. 2011.
3. Benjamin Kroposki, Thomas Basso, Richard DeBlasio, ‘’Microgrid Standards
and Technologies’’, IEEE Power and Energy Society General Meeting - Conver-
sion and Delivery of Electrical Energy in the 21st Century, 12 Aug. 2008.
4. Xuesong Zhou, Tie Guo and Youjie Ma BinshuiXidao, Xiqing, ‘’An Overview
on Microgrid Technology’’ ,IEEE International Conference on Mechatronics and
Automation (ICMA), 3 Sept. 2015.
5. PouyaBorazjani Noor Izzri Abdul Wahab Hashim b. Hizam Azura Bt Che Soh
‘’A Review on Microgrid Control Techniques Centre for Advance Power and En-
ergy Research ‘’(CAPER) ,IEEE Innovative Smart Grid Technologies - Asia
(ISGT ASIA), 11 Aug. 2014.

ISBN :978-81-945631-7-4

154
6. AmbarnathBanerji,DebasmitaSen,Ayan K. Bera, DebtanuRay,DebjyotiPaul,Anu-
ragBhakat, ‘’MICROGRID : A Review’’, 2013 IEEE Global Humanitarian Tech-
nology Conference: South Asia Satellite (GHTC-SAS),15 Oct.2013.
7. Mohammad Reza Miveh Majid Gandomkar, SohrabMirsaeidi, Mohammad
Reza, Gharibdoost ‘’A Review on Protection Challenges in Microgrids’’ IEEE
trans. Protection 2012.
8. Abhishek Kumar, Akbar Hussain,Muhhad Zafar Ullah Khan,‘’Microgrids Tech-
nology: A Review Paper’’,Gyancity Journal of Electronics and Computer Sci-
ence, 2018, Vol 3, Issue 1, p. 11-20
9. Hartono BS ‘’Review of Microgrid Technology ‘’, 2013 International Conference
on QiR, 17 Oct.2013.
10. Ben Yu, Junke Gou Changxin Zhou, Zhiyong Gan, Jinshan Yu, Fei Lu ’A Review
of Microgrid Technology with distributed energy’
11. D. Mahinda Vilathgamuwa, Poh Chiang LohProtectionof Microgrids During
Utility Voltage Sags IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS,
A

VOL. 53, NO. 5, OCTOBER 2006


12. Kwasinski and C. N. Onwuchekwa “Dynamic behaviour and stabilization of dc
microgrid with instaneousconstat power load”, IEEE Transactions on Power Elec-
tronics ( Volume: 26 , Issue: 3 , March 2011 )
13. H. kakigano Y Miura and T. Ise “Low voltage bipolar type DC Microgrid for
Super High Quality Distribution”, IEEE Transactions on Power Electronics ( Vol-
ume: 25 , Issue: 12 , Dec. 2010 )
14. Bharti Dwivedi Saranjeet Kaur“Power Quality issues and their Mitigation Tech-
nology in Microgrid System- A Review”
15. Abdar, H., Chakraverty, A., Moore, D., Murray, J. and Loparo, K. (2012). Design
and implementation a specific grid-tie inverter for an agent-based microgrid. 2012
IEEE Energytech.
16. Lexuan Meng, Mehdi Savaghebi, F. Andrade, Juan C. Vasquez, Josep M. Guer-
rero ‘’Microgrid Central Controller Development and Hierarchical Control Im-
plementation in the Intelligent MicroGrid Lab of Aalborg University’’ IEEE
trans.
17. Dragicevic, T., Lu, X., Vasquez, J. and Guerrero, J. (2016). DC Microgrids—Part
II: A Review of Power Architectures, Applications, and Standardization Is-
sues. IEEE Transactions on Power Electronics, 31(5), pp.3528-3549.
18. Kaur, S. and Dwivedi, B. (2016). Power quality issues and their mitigation tech-
niques in microgrid system-a review. 20167th India International Conference on
Power Electronics (IICPE).
19. Kakigano, H., Miura, Y. and Ise, T. (2010). Low-Voltage Bipolar-Type DC Mi-
crogrid for Super High Quality Distribution. IEEE Transactions on Power Elec-
tronics, 25(12), pp.3066-3075. CERTS Microgrid Laboratory Test Bed IEEE
Transactions on Power Delivery, Vol. 26, No. 1, January2011
20. Jae-Do Park, Jared Candelaria,IEEE Fault Detection and Isolation in Low-Volt-
age DC-Bus Microgrid System IEEETransactions on Power Delivery
21. D. Mahinda Vilathgamuwa, IEEE, Poh Chiang Loh, and Yunwei Li, “Protection
of Microgrids During Utility Voltage Sags”, IEEE Transactions on Industrial
Electronics, Vol. 53, No. 5, October 2006

ISBN :978-81-945631-7-4

155
22. Peng, F., Li, Y. and Tolbert, L. “Control and protection of power electronics in-
terfaced distributed generation systems in a customer-driven microgrid” 2009
IEEE Power & Energy Society General Meeting.
23. Joan Rocabert, Alvaro Luna, FredeBlaabjerg, Pedro Rodr´ıguez, “Control of
Power Converters in AC Microgrids”, IEEE Transactions on Power Electronics,
Vol. 27, No. 11, November 2011.
24. Chairman: Claudio A. Cañizares“Trends in Microgrid Control” IEEETransac-
tions on Smartgrid, Vol.5,No.4,July 2014.
25. Xiong Liu, Peng Wang, Poh Chiang Loh, “A Hybrid AC/DC Microgrid and Its
Coordination Control”, IEEETransactions on Smart Grid, Vol. 2, No. 2, June
2011
26. E. Barklund, NagarajuPogaku, Milan Prodanovic ´, C. Hernandez-Aramburo, Tim
C. Green, “IEEE EnergyManagementinAutonomousMicrogridUsing Stability-
Constrained Droop Control of Inverters”,IEEE Transactions on Power Electron-
ics, Vol. 23, NO. 5, September 2008
27. F. Katiraei, M. R. Iravani, “IEEE Power Management Strategies for a Microgrid
With Multiple Distributed Generation Units” IEEE Transactions on Power Sys-
tems, Vol. 21, No. 4, November 2006
28. E. Barklund, NagarajuPogaku, Milan Prodanovic´, C. Hernandez-Aramburo, Tim
C. Green, “EnergyManagementinAutonomousMicrogridUsing Stability-Con-
strained Droop Control of Inverters” IEEE Transactions on Power Electronics,
Vol. 23, No. 5, September 2008
29. Robert H. Lasseter Smart Distribution: Coupled Microgrids Proceedings of the
IEEE | Vol. 99, No. 6, June 2011
30. Joan Rocabert,Alvaro Luna, FredeBlaabjerg, Pedro Rodr´ıguez, “Control of
Power Converters in AC Microgrids”, IEEETransactions on Power Electronics,
Vol. 27, No. 11, November 2012.

ISBN :978-81-945631-7-4

156
Experimental Analysis of 3D Printed Patterns and
Conventional Pattern: A Review
Mr. Pradip B. Navale1 and Prof. Dr. Kedar H. Inamdar2
1Student, Dept. of Mechanical Engineering,Walchand College of Engineering, Sangli
2Professor, Dept. of Mechanical Engineering,Walchand College of Engineering, Sangli
pradipnavale7@gmail.com

Abstract. In these two methods have been studied comparatively in


order to produce casting pattern, traditional sand casting process and
additive manufacturing or 3D printing process. On the basis of cost
comparison 3D printed pattern casting is more expensive than
conventional casting method due to its costly plastic material which is
used for pattern making. Based on quality parameter the 3D printed
pattern is suitable to use for sand casting. In terms of quality, surface
finish, cost, and dimensional accuracy the two processes are
compared. The results show that the use of additive manufacturing in
production has significant advantages. This research provides a detail
study of the fabrication of a master pattern (step bar) of casting using
rapid prototyping technique as well as presenting its scope and benefits
to the current practices.

Keywords: 3D Printing, conventional Patterns, Casting.

1 Introduction

Most of the general steps in the modern casting sand process, including base, mold,
core and core container, are derived from part geometry, accompanied by
adjustments to provide different allowances. These initiatives provide new
opportunities to introduce additive manufacturing or 3D printing techniques for the
manufacture of sand molds. The manufacture of a metal casting should have to
consider the availability. The geometric freedom provided by AM technology is
therefore an essential asset which can be used in conjunction with traditional
processes. Contrary to the long history of traditional sand casting technology, just a
few decades ago additive manufacturing was emerging. Many of the 3D-printed
mold applications provide lightweight tooling for conventionally built castings.
Some pattern making shops have begun to embrace this AM technology as a better
method to check component designs and pattern designs. Along with gating
mechanisms, various shrinkage and draft allowances can be optimized. Until the
concept has been completed [1]. Metal Casting is one of the oldest manufacturing
processes and is now considered an art, rather than science. Metal casting has been a
primary method of manufacture since BC for many centuries, and is so still today in
the 21st century. In developing countries, the foundry industries suffer from low

ISBN :978-81-945631-7-4

157
quality and productivity due to the presence of multiple process parameters in casting
processes. Even in a fully regulated process, casting defects are found and hence
casting process is also known as uncertainty process that challenges explanation
about the cause of casting defects. Casting simulation has become a valuable method
for visualizing mold filling, solidification and cooling and for predicting the position
of internal defects, such as shrinkage porosity, sand inclusions and cold shuts[2].
Thanks to its economic characteristics the sand casting process is one of the
expandable mold methods and considered the most commonly used casting
technique. This method is used to manufacture around 70 per cent of all casting of
metal. The traditional method of casting the sand begins with pattern making.
Usually the patterns are made of wood, metal, plastic or other materials[3].
Various Casting Processes
i. Sand casting.
ii. Permanent mold casting.
iii. Investment casting.
iv. Lost foam casting.
v. Die casting.
vi. Centrifugal casting.

Generalized steps in casting process using 3D printed molds:

The objective is to provide a comparative study of mold fabrication between


traditional sand casting process and new developed 3D printing process. In this the
process of 3D printed mold and core will be presented due to its uniqueness,
followed by assembly of the mold components. In another section results and
discussion, the weight, surface finish, design allowance, and fettling work of the two
processes will be compared. The steps for generalized casting process using 3D
printing mold.
i. Collection of 3D data.
ii. 3D printing of mold.
iii. Metal preparation assembly of component.
iv. Pouring into mold and solidification.
v. Heat treatment inspection.

2 Literature review:

N. Hawaldar and J. Zhang [1] analyzed two processes to fabricate casting mold,
conventional sand casting process and additive manufacturing or 3D printing process,
are compared. The two processes were compared in terms of their weight saving,
surface finish design allowance and fettling work. The results show that there are
significant advantages in using additive manufacturing in the production of mold.
The 3D printed molds provide substantial saving of sand used, design allowances
and fettling work. The mechanical properties of 3D printed molds are also higher
than the conventional ones due to good bonding strength during 3D printing.
B. Ravi [2] stated that metal casting process, the development of tooling (pattern and
core-boxes) accounts for more than 70% of the lead-time for the first article of

ISBN :978-81-945631-7-4

158
approval [1], and greatly influences the cost and dimensional quality of the final
product. Much of this time is spent in tool design and process planning. A
combination of Intelligent Computer-Aided Design, Rapid Prototyping (RP) and
Rapid Tooling (RT) promises to reduce the tooling lead-time by 50%. Several RP
processes have been developed in the last ten years, including Fused Deposition
Modeling, Laminated Object Manufacturing, Stereo-lithography and Selective Laser
Sintering all of them based on slicing a 3D CAD model and fabricating it layer-by
layer.
M. C. Frank et al. [3] stated that the Rapid Pattern Manufacturing system developed
for the sand casting process. It involves both additive and subtractive techniques
whereby slabs are sequentially bonded and milled using layered tool paths. As such,
patterns are grown in a bottom-up fashion, both eliminating the need for multi-axis
operations and allowing small features in deep cavities. This system is specifically
targeted at large wood and sand casting patterns. This method introduces a new
support structure approach by integrating a flask into the pattern build process. In this
slicing algorithms that optimally place layer transitions to avoid thin sections near
flats, peaks, and valleys or where interaction with chemically bonded sand could be
problematic. Testing of the system in the development of next generation military
equipment is presented in a case study.
A. Rajput et al. [4] they compared Investment casting and conventional casting.
Investment casting also called the lost wax process or the precision casting process is
very different from conventional casting process. Quality parameters are important
considerations now a day in various fields where precision casting is required such as
aerospace, defence equipment, automobile, medical and dental instrumentation and
jewelleries. In this paper they compared conventional casting method with
investment casting method of same product on the basis of cost, quality and
dimensional accuracy[4]. The data is obtained by performing mentioned two methods
experimentally in the workshop; result comparison between data is showing that
investment casting gives high dimensional accuracy product with good surface
quality. The initial step of any casting method is gating system design for casting. In
this they conclude that a good casting mostly depends on the correct gating design
for achieving accurate casting product without time loss. So gating design is also
important while achieving good dimensional accuracy.
S. Kumar et al. [5] analyzed that study on various sand casting parameters which
affect the casting qualities. The following parameters affect the quality such as
Moisture, Green strength, Pouring temperature all this parameters affect the casting
defects and also shows the optimal settings of each parameter to reduce the casting
defects and improves the quality of castings at low cost. By the application of
Taguchi’s method to the green sand casting process, the productivity of the castings
produced increases and maintains the stability of the casting process. Before the
application of Taguchi’s method, the parameters of the casting process were more
arbitrary and it was difficult to set of their appropriate level and hence, the product
quality had instability problems. Taguchi’s method yielded optimized control factors,
resulting in superior product quality and stability.
R. Banchhor and S. Ganguly [6] concluded that industrial activities sand casting
process still remains as one of the most complex and indefinite activities. Due to the
complex relationship between casting defects and green sand properties, it is

ISBN :978-81-945631-7-4

159
imperative to control many green sand characteristics that influence casting quality.
Current test-- approach based on know- experience has many drawbacks such as
being non-, time-, error- and long- experimental necessity. This conventional method
needs to be replaced to manufacture higher quality casting items within a fair amount
of time, allowing better use of statistics, artificial intelligence. This paper extensively
reviews published research on green sand casting process. The effects of riser design,
gating system, molding sand, oxidation and deformation of casting during heat
treatment, machining allowance, etc., on the economical manufacture quality castings
were reviewed. Determining the optimum process parameter setting would
dramatically increase mold yield, metal production ratio, shorten manufacturing time,
save energy and money, minimize emissions, and enhance market
competitiveness[6].
A. Pranjal and A. Kuthe [7]studied that to bring about a revolution in Manufacturing
Rapid Prototyping (RP) method was used for making a prototype orpattern for
casting a product. A new method for investment casting was found outusing RP:
Fused Deposition Modeling (FDM). RP parts were also tested for usingthem as
patterns for sand casting. Software named “AUTOCAST-X” was used fordesigning
and simulating zero defect casting. This paper deals with the application of rapid
manufacturing techniques to save the time as well as cost ofmanufacturing of few
critical components of automobiles. A case study of Inlet manifold of engine and
Rotor of diskbreak is taken here to demonstrate the method.
S. Jauhar et al. [8] They analyzed capabilities to fabricate freeform surfaces, inbuilt
cores projections and supports are the unbeatable strengths of RP processes. The use
of benefits in terms costs have proved that the adoption of RP technology is techno-
economically justifiable for the Indian manufacturing industries. Rapid prototyping
have proved to be a cost-effective and time efficient approach for development of
pattern making, there by ensuring possibility for technology transfer in Indian
manufacturing industries. This paper deals with the application of rapid
manufacturing techniques to save the time as well as cost of manufacturing of few
critical components of automobiles. A case study of Inlet manifold of engine and
Rotor of disc break is taken here to demonstrate the method. While working on this
objective the aim will be to reduce the lead time required for tooling required for the
conventional block-type investment casting process. There are strong incentives to
reduce costs while increasing speed and accuracy in the current market. RP is an ideal
method when the components are complex in shape because it substantially
compresses the time for developing prototypes patterns and tooling[8].

ISBN :978-81-945631-7-4

160
3 Fused Depositions Modeling

Fused Deposition Modeling (FDM) is a type of technology for additive


manufacturing that allows the construction of three-dimensional objects, prototypes
and products through a computer-aided or manufacturing process. It is used in 3-D
printing or the development of solid models and prototypes in a layered or additive
approach.
FIGURE1: FUSED DEPOSITION MODELING

Figure 1 indicate that the printing of pattern which is used in sand casting The
standard two-dimensional printer used to print paper from right to left along the x-
axis, and on the y-axis from top to bottom. The Z-axis up and down is used for 3D
printing. A scanner is used to construct an universal 3D printing file format, a digital
object file called the Standard Tesselling Language (STL).

4 Need of Rapid Prototyping in Manufacturing


Rapid prototyping techniques do not involve tools or installations, resulting in easier
set-up, lower overhead costs and shorter lead times for production. The predictably
impossible, extremely expensive and time-consuming parts can be constructed with
RP ease. Mass manufacturing tools such as molds and dies can be easily and quickly
prepared with RP.
i. RP fabrication process is automated.
ii. Fabricates intricate and small parts.
iii. Substantial reduction in lead time.
iv. Eliminates tooling.
v. Eliminates process planning.
vi. Customized product.
vii. Produces no scrap.

ISBN :978-81-945631-7-4

161
5 Scope of Rapid Prototyping in Manufacturing

i. Scope for technology transfer in foundry industry.


ii. Determination of minimum part builds cost in FDM.
iii. Cost/benefit analysis for rapid prototyping industry.
iv. Casting cost estimation for casting.

6 Acknowledgement

The authors acknowledge the supports provided by Walchand college of engineering


Sangli. The authors would also like to thank the support of the Poorva metal casting
industries, Sangli.

7 Conclusion

The study of this work is based on the comparison between conventional patterns and
3D printed pattern:
On the basis of cost comparison 3D printed pattern casting is more expensive than
conventional casting method due to its costly plastic material which is used for
pattern making. Based on quality parameter the 3D printed pattern is suitable to
use for sand casting.

References

1. N. Hawaldar, J. Zhang. : A comparative study of fabrication of sand casting mold using


additive manufacturing and conventional process. The International Journal of Advanced
Manufacturing Technology, pp.1037-1045 (2018).
2. Dr. B. Ravi. : Casting Simulation- Best Practices. Transactions of 58th Indian Foundry
Congress, Ahmadabad, pp.1-6 (2010).
3. M. Frank. : A Hybrid Rapid Pattern Manufacturing System for Sand Castings, Industrial
and Manufacturing Systems Engineering. vol. 6, pp. 786 – 797 (2009).
4. A. Rajput, M. Mahajan and J. Patil. : Comparative Analysis of Conventional and
Investment Casting by Experimental & FEA Simulation. International Journal of
Engineering Research & Technology, pp. 237-246 (2016).
5. S. Kumar, P. S. Satsangi, D. R. Prajapat. : Optimization of Green Sand Casting Process
Parameters of a Foundry by using Taguchi Method. International Journal of Advance
Manufacturing Technology, vol. 55, pp. 23-34 (2011).
6. R. Banchhor, S. Ganguly. : Optimization In Green Sand Casting Process For efficient,
Economical And Quality Casting. Journal of Materials Engineering and Performance,
International Journal of Advanced Engineering Technology , pp. 0976-3945 (2014).
7. C. W. Lee, C. K. Chua , C. M. Cheah, L. H. Tan, C. Feng. : Rapid investment casting:
direct and indirect approaches via fused deposition modeling”. International journal of
manufacturing Technology, vol. 23, pp. 93-101(2004).
8. R. Patil, S. Kumar, E. Abhilash‖. : Development of Complex Patterns : Scope and Benefits
of Rapid Prototyping in Foundries‖ International Journal of Engineering and Innovative
Technology. Vol. 1, pp.25-70 (2012).

ISBN :978-81-945631-7-4

162
BRIEF REVIEW: VOLTAGE STABILITY AND
POWER FLOW ENHANCEMENT BY UPFC AND
DPFC; AND COMPARISON OF FACTS DEVICE

Mayanka Roy, Prof A.K Kori, Miss Pooja Sahu

Department Of Electrical Engineering, Jabalpur Engineering College;


Jabalpur M.P. India

mayankaroy100393@gmail.com

Abstract. For industrialized revolution electricity is considered to be the back


bone due to which load demand is increasing at a rapid rate and to fulfil the de-
mand the generation capacity is to be enhanced. Voltage fluctuation occurs in the
power system due to internal and external unbalance as a result bus voltage
changes. There are various FACTS devices which eliminate the voltage unbal-
ance and other increases in the system line. UPFC (Unified Power Flow Control-
ler) is an equipmentwhich can eliminate both the voltage unbalance and reinforce
the power flow range of transmission structure. Similarly DPFC (Distributed
Power Flow Controller) the only difference between UPFC and DPFC is the
common DC link, which is absent in DPFC. In this paper the analysis of UPFC,
DPFC, and other FACTS devices are done, on the basis of control of active &
reactive power, voltage instability and power flow enhancement.

Keywords: UPFC, DPFC, voltage profile, active & reactive power, comparison of
FACTS devices

1 Introduction

The interesting part of planning transmission system with FACTS technology is, it
opens various parallel path for enhancing and controlling the power flow capacity, with
upgradation of system line. The opportunities of controlling various parameters of the
transmission system is through the competence of FACTS devices. FACTS controllers
restraint the parameter which are analogous. Hence, control the operation of each pa-
rameter of the transmission i.e series/shunt impedence, voltage, current, phase angle,
and oscillation damping at assorted frequency below the rated. By providing flexibility
through FACTS controller, it ensure the line to utilize power approximately to its ther-
mal power. It should be esteemed that FACTS is sanctionative automation and it is
neither a replacement of one-on-one automated switches.
In present power system; if we want to enhance the capacity with minimal cost of
generation, a very bright and useful technology has been acquaint in the world of power
system, very well known as FACTS. FACTS resemble i.e full form of FACTS

ISBN :978-81-945631-7-4

163
is‘Flexible AC Transmission System’; which is completely power electronic based au-
tomation, having various controllers for compensating different parameters.
The FACTS devices are considered boon due to its following advantages:-
a. Enhancement of transient and dynamic stability.
b. Voltage and power profile improvement.
c. Line compensation.
d. Power factor improvement.
The voltage volatility in any of the system arise due to lack of reactive power. The
inbuilt properties of FACTS controllers is to absorb or inject real power or reactive
power when needed, as a result which preserve voltage stability in structure. FACTS
controllers are characterized into following four types-
SERIES – SSSC, TCSC, TSSC, TCSR, TSSR etc.
SHUNT – SVC, STATCOM, TCR, TSC, TSR, etc.
COMBINED SERIES-SERIES – IPFC.
COMBINED SHUNT-SERIES – UPFC, DPFC.

2 Brief Review

Various analytic methods has been adopted for enhancement of voltage stability deter-
mination, power flow improvement which indirectly or directly enhance power quality
of the system as per requirement by application of FACTS controllers [5]. In paper
where and how FACTS controllers are implemented in distribution and transmission
structure along with there effects is been calculated [2]. How FACTS controllerwere
working in system has been discussed [1]. FACTS controllers are introduced in [6].
Power quality reinforcement in transmission structure by FACTS is demonstrated in
[7]. Comparison on the basis of characteristics of different FACTS has featured in
[4].

3 Short Description of Few Basic Facts Controllers

FACTS CONTROLLERS: A device based on power electronic and few static equip-
ment which controls various parameters of AC transmission.

3.1 Shunt Connected Controllers


3.1.1 STATCOM(Static Synchronous Compensator)-It is a static synchronous
generator which is shunt connected and inductive or capacitive output

ISBN :978-81-945631-7-4

164
current can varied. One of the important FACTS controllers based on volt-
age or current source converter; shunted with the system. STATCOM along
with storage device help to enhance dynamic characteristics and can also
used as active filter for harmonics. The figure of STATCOM without storage
is shown in fig (a), and with storage is displayed in fig (b)

Fig (a) and (b) STATCOM without storage and with storage device

3.1.2 SVC(Static Var Compensator)- Static var compensator (SVC) is shunt


connected with line. It comprises various controllers for injecting and ab-
sorbing reactive vars. ThyristorControlled Reactor(TCR)or Thyristor
Switched Reactor(TSR) for arresting reactive vars and Thyristor Switched
capacitor(TSC) for infusing reactive vars according to the system need.
Along with the thyristors it has different filters for filtering harmonics. Its
main use is for power factor improvement.

ISBN :978-81-945631-7-4

165
Fig (c) SVC with various controller

3.2 Seriesconnected Controllers


3.2.1 STATIC SYNCHRONOUS SERIES COMPENSATOR (SSSC)- SSSC
is connected in series with the line due to which it does not require any for-
eign energy source; and output voltage is in quadrature and freely controlled,
for the aim of incrementing or decrementing the overall reactive voltage drop
along system which therefore control the broadcasted electric power. It may
add cache or absorbing energy devices for enhancing dynamic behavior. Fig
below shows the elemental structure of SSSC with and without storage.

Fig (d) SSSC without storage

ISBN :978-81-945631-7-4

166
Fig (e) SSSC with storage

3.3 SHUNT-SERIES CONTROLLERS

3.3.1 UPFC (Unified power Flow Controller) – UPFC is well known for one of
best and versatile FACTS devices, having capability of infusing voltage in
series with the system, the voltage which is to be infuse may have any mag-
nitude and phase in comparison to the line voltage. UPFC basically has shunt
and series converter along with each three phase transformer. Both convert-
ers are regulated from a common DC link with a storage capacitor. The flow
of power is bi-directional in the two AC branches. Each converter can itself
absorb or generate reactive power at output branches [10]. In UPFC it also
has PWM(Pulse WidthModulation). The PWM modulation technique is
used for getting defined output voltage, help in reducing filters used, and
lastly to get instant dynamic response [10]. Inverter generate harmonics
which are attenuated by filter of second order, which in turn results in low
THD(TotalHarmonic Distortion) for transformer [11]. UPFC is compiled
form of a stagnant compensator & stagnant series compensator. It can sim-
ultaneously act as both shunt compensator and phase shifting device.)

OPERATING PRINCIPLE: The basic component is shared by a common DC ca-


pacitor, which in turn linked to the system over coupling transformer. The two compo-
nents are voltage source inverters. The shunt and series inverter are connected through
shunt transformer and series transformer respectively.

ISBN :978-81-945631-7-4

167
Symmetrical three phase voltage with manageable magnitude and phase angle is in-
jected by the series inverter in series with line to control both active and reactive power
flow, hence it exchange both active & reactive power. Voltage across the storage ca-
pacitor is maintained constant by the shunt inverter and the restcapacity of shunt in-
verter could be used for swap of reactive power with the line for providing voltage
regulation. The detailed figure of UPFC is shown below with two voltage source in-
verters connected through transmission system with series and shunt transformer.

Fig (f) UPFC with two back to back voltage-sourced inverters

3.3.2 DPFC (Distributed Power Flow Controller) – DPFC is borrowed from


UPFC, having exact control strategies same as the UPFC , it can monitor all
the parameter. When from UPFC we eliminate the common DC link which
is in between two VSI we get DPFC. Thereby the flow of active power which
is bi-directional between shunt and series will be now from transmission sys-
tem at third harmonic frequency. The series converters used in DPFC are
distributed FACTS (D-FACTS)[12].

Flow chart from UPFC to DPFC

DPFC PRINCIPLE: By eradicating the common DC link and by apportion the se-
ries convert of UPFC we tried to increase the reliability and make the device economi-
cal. DPFC has one shunt converter which resemble STATCOM, and multiple series
connected converter, which use the concept of using various single phase less rated
converter in place of one huge rated converter. The converter in DPFC has its own DC-
capacitor which fulfil its requirement of DC-voltage and each converter is independent.
Along with converters it has one high pass filter shuntedon opposite side of shunt

ISBN :978-81-945631-7-4

168
converter in transmission line and at both the ends there are two star-delta connected
transformer. The setup of DPFC IS shown in fig (f), below

Fig (g) DPFC setup

FACTS CONTROLLED CONNECTION WITH REMARKS


CONTROLLERS PARAMETER TRANSMISSIONSYSTEM
❖ TCSC • Impedence Series Tysristor con-
• Voltage stability trolled inductor is
transmission placed in parallel
system
• Increase power
flow control
fault current
❖ SVC • Synchronize Parallel More authentic
transmission
voltage
• Improve power
quality
❖ STATCOM • Amplitude and Parallel On comparing
phase angle SVC&
• Active & reac- STATCOM,
tive power STATCOM is
more reliable
❖ SSSC • Inject three Series More beneficial
phase voltage than TCSC as it not
• Indirectly con-
trol line voltage

ISBN :978-81-945631-7-4

169
affect impedence
of line [13]

❖ UPFC • All the above Shunt-series Highly versatile


mentioned pa- controller
rameter
❖ DPFC • All the men- shunt-series Reliable and
tioned parame- cost effective than
ters UPFC

Table 1. Comparison Of UPFC/DPFC To Other Facts Devices

4 Experimental Analysis

A transmission system of 500/230 KV grid has been modelled in Simulink to analyse


the system before and after compensation done by the UPFC controller. UPFC is used
to curbpower flow in transmission structure. The grid consist of five bus system from
(B1 to B5) that are connected via transmission lines and transformer banks. There are
two power plants which generate 1500 MW. Under normal operation condition , the
bulk amount of generating capacity is given by second power plant. When bypass
breaker is closed , plant 1 and plant 2 generate 500 and 1000 MW power respectively.
The power on bus bar B1 to B5 is been noticed. The load flow shows that large portion
of the power is generated by plant 2, which transmitted by the transformer bank 2,and
making it overloaded by 99MW. Now ,UPFC which is located at L2 is used to curb the
active & reactive power at bus 3. The series converter can infusemaximum of 10% line
to ground in series with the line. When UPFC comes into action in the system the over-
loading of transformer bank2 eliminated and power flow of the system enhances.

Fig (h) Simulink model of compensation by UPFC

ISBN :978-81-945631-7-4

170
5 Conclusion

This paper has presented a brief review of all FACTS controllers. The most versatile
device is UPFC but whose cost is quite expensive, which limit the practical application
where the voltage and power flow control is required simultaneously. Hence DPFC is
introduced which is cheaper and can be implemented more often. The reliability of
DPFC increases due to repeatedly use of series converters which reduces the probability
of error in the transmission system. When compared to other FACTS controllers the
performance of UPFC is found to be the best except cost and reliability, therefore by
looking from the point of view of DPFC it can figure out the problem of cost and reli-
ability as well.

Future Scope

The advantages of DPFC over UPFC by replacing series converter by D-FACTS


make its future useable in enhancing power quality by keeping voltage of the system
balanced and help in maintaining voltage dip & voltage swell in the transmission struc-
ture. Following few advantages of DPFC makes DPFC one step ahead of UPFC-
1. High control capability
2. Increased reliability
3. Low cost.

References
[1] Singh, Mukesh Kumar, and Nitin Saxena."Performance Analysis and Com-
parison ofVariouFACTS Devices in Power System."July 2013, ISSN
No.(Online): 2277 2626(2013).

[2] Padiyar, K. R. FACTS controllers in powertransmission and distribution.


New Age International, 2007.

[3] A Chakrabarti&SunitaHalder,“PowerSystem Analysis Operation and Con-


trol’’ Prentice Hall of India Pvt,Limited ,NewDelhi2006.

[4] Mr .K.G.Damor ,Mr.H.kumar, GPatel,Mr.VineshAgarwal,Dr.D.M.Pa-


tel,“Comparison of different FACTSdevices’’,IJSTE-Vol,1,Issue 1,July 2014.

ISBN :978-81-945631-7-4

171
[5] M. P. Donsion , J. A. Guemes , J.M.Rodriguez, “Power Quality Benefits ofUti-
lizing FACTS Devices inElectrical Power System’’, IEEE 2007,26-29.

[6] B .singh, K.S.Verma, D. Singh, C.N.Singh,Ekta Agarwal, Rahul Dixit,


BaljivTyagi ,“Introduction of FACTS Controllers, ACritical Review,’’Interna-
tional Journal ofReviewsIn Computing, Vol 8,31st December2011.

[7] S. Selvakumaran And S.M.Kalidasan,“PowerQuality Improvement In Trans-


mission SystemUsing FACTS Devices’’,2016 OnlineInternational Conference
Green EngineeringAnd Technology(IC-GET).

[8] G. Vishwakarma and Nitin Saxena,“Enhancement of voltage profile by using-


Fixed Capacitor-Thyristor ControlledReactor (FC-TCR)’’,IJEECE2(2):18-
22(2013).

[9] DiptiMohanty, Aziz Ahamad, M .Khan,“Modeling,Simulation and Perfor-


mance analysis ofFACTS Controller in Transmission Line’’,IJETAE, Volume
3,Issue 5, May 2013.

[10] N. G. Hingorani and L. Gyugyi, UnderStanding FACTS: concept and technol-


ogy of flexible AC transmission systems. New York: IEEE Press, 2000

[11] A. Rajabi-Ghahnavieh, M. Fotuhi-Firuzabad, M. Shahidehpour, and R. Feuil-


let, "UPFC for enhancing power system reliability," IEEE Trans. Power Del.,
vol. 25, no. 4, pp. 2881–2890, 2010.

[12] M. D. Deepak, E. B. William, S. S. Robert, K. Bill, W. G. Randal,T. B. Dale,


R. I. Michael, and S. G. Ian, “A distributed static seriescompensator system
for realizing active power flow control on existingpower lines,” IEEE Trans.
Power Del., vol. 22, no. 1, pp. 642–649, Jan.2007.

[13] R.Pratheeksha, K. M. Kavitha, “ Analysis of STATCOM, SVC andUPFC De-


vices For Transient Stability Improvement in PowerSystem ”, International
Journal of Science and Research, Vol. 5,No. 5, May 2016.

ISBN :978-81-945631-7-4

172
An informative analysis of Encryption algorithms using
quantitative Fitness Function

Rajeev Chourey1, Chhayansh Purohit2, Vanshita Bansal3, Shivam Pratap Singh4


1234 Computer Science and Engineering, Jabalpur Engineering College, Jabalpur, India
rajeevchourey786@gmail.com

Abstract. Today, we are using an enormous amount of data and applications in


our day to day life. But not every information is shareable and hence need to be
prevented from illegitimate access. Any vulnerability can lead to exploitation and
therefore requires security. This can be achieved by encrypting the data and then
the information can be passed on safely. Encryption is the process of converting
data or information into a coded form so that only the authorized user has access.
To make information more secure Cryptography has come into the picture.
Cryptography is the most common method to provide security in the virtual
world. There are various Cryptographic algorithms (means of altering data by
converting plaintext to ciphertext) such as AES, DES, 3DES, BLOWFISH, and
TWOFISH that have been compared below. These algorithms can be efficient
depending on the type of field they are used in. In this paper, we are focusing on
comparing every aspect of these algorithms. Based on the overall performance
analysis of the algorithms we give the best-suited technique for use. The perfor-
mance criteria are the Fitness Function which is the implementation of the
weighted sum model of the multicriteria decision analysis methods, that is com-
puted by taking values such as encryption time, decryption time, etc. Higher the
value of Fitness Function better is the performance of algorithm.

Keywords: AES, DES, 3DES, BLOWFISH, TWOFISH, Fitness Function, Av-


alanche Effect, Encryption Algorithms

1 Related Work

This section gives us a brief overview of studies done in the past that are related to
the comparative analysis of data encryption algorithms. A thorough reading of papers
published on the above-mentioned topic has helped us to propose a unique and reliable
way for the analysis of cryptographic algorithms.
Authors of [1], have done a comparative analysis of three algorithms: RSA, DES,
and AES based on parameters like computation time, memory usage, output byte. These
are three prime parameters that give us a measure of the performance of any encryption

ISBN :978-81-945631-7-4

173
algorithm. The paper shows that DES takes the least encryption time among other al-
gorithms under study. RSA consumes the longest time to encrypt raw data.
There is a subtle difference between the encryption time of DES and AES algorithm.
From memory usage aspect AES outperforms the other two (RSA and DES) algo-
rithms. RSA has high memory usage but when it comes to output byte it gives cipher-
text of shorter length than the other two algorithms.

In [2], Alanazi and his other co-authors did a comparative analysis of three encryp-
tion algorithms (DES, 3DES, and AES). Factors under consideration were the key
length, block size, possible keys, cipher type, security, possible ASCII printable char-
acter keys and time required to check all probable keys at a rate of 50 billion keys per
second, etc. The authors came out with the result that AES is better than DES and
3DES.
In[3], Authors have focused their study on five data encryption algorithms (DES,
3DES, AES, RSA, and MD5) and done a thorough analysis of them by taking various
factors such as block size, key size, and encryption time/decryption time, possible keys,
etc. The paper concludes that AES has a greater edge over other algorithms under con-
sideration in terms of execution speed, time to break the algorithm and security.
The content in, [4] is based on performance analysis of various encryption tech-
niques used to implement multistage encryption and decryption of data being stored on
a cloud. Authors of this paper have tried different combinations of encryption algo-
rithms such as RSA & DES, RSA & AES, RSA & IDEA for multistage encryption and
they evaluated above-cited combinations in terms of encryption time performance. Ex-
perimental results of the paper suggested that RSA & IDEA gave higher performance
than other combinations.
Unlike any other theoretical comparisons [5], it has proposed a method of compar-
ing different cryptographic algorithms by analyzing trade-offs in their strength, weak-
ness, cost, and performance and then recommending the best algorithm which meets
the user requirements best. The authors took five algorithms: DES, 3DES, RSA, AES,
and BLOWFISH for their study. Various evaluation parameters considered in this paper
are encryption time, decryption time, memory used, Avalanche effect, entropy, number
of bits required for encoding optimally. Experimental results showed that BLOWFISH
has less memory requirement whereas RSA requires the largest memory among con-
sidered algorithms. RSA took the longest time to encrypt and decrypt while
BLOWFISH consumed the least time amongst all. When the evaluation was done on
the avalanche effect parameter it was observed that AES shows the highest avalanche
effect which makes it more reliable in applications where confidentiality is of para-
mount concern. Results also showed that BLOWFISH has the highest entropy i.e.
Blowfish has strong resistance against brute force attacks and AES requires the highest
number of bits to be encoded optimally an encrypted data and DES demands less num-
ber of bits be encoded optimally.

ISBN :978-81-945631-7-4

174
2 Algorithms in Consideration

2.1 AES

Advanced encryption standard (AES) is a block cipher encryption algorithm, it uses


a symmetric key of variable length 128 bit,192 bit and 256-bit keys, it allows a data
block of 128 bits at a time for encryption process and number of rounds depends on the
key size selected i.e. 10 rounds for 128 bit, 12 rounds for 192 bit and 14 rounds for
256-bit keys, AES Is the most used widely accepted encryption algorithm for data en-
cryption

2.2 3DES
Triple data encryption standard (3DES) is an improvised version of the DES algo-
rithm it uses the sequential implementation of DES algorithm on the plain text three
times with three types of keys. Due to improvements in modern computers and high
computational powers, the old DES algorithm became prone to brute force attacks so
adding two more layers over the same algorithm made it enough complex. It uses a key
of 168 and 112 bits and 64-bit block size and 48 rounds.

2.3 BLOWFISH
BLOWFISH is a block cipher encryption algorithm, this algorithm is open source
with no patent and has a huge application base, this algorithm has a block size of 64
bits and has a variable-length key which varies from 32 bits to 448 bits, this algorithm
works on fiestal network. This algorithm was designed as a suitable replacement for
existing algorithms as a fast and secure algorithm.

2.4 TWOFISH

TWOFISH is a symmetric block cipher with 128-bit block size and key size up to
256 bits it was one of the top five finalists of the advanced encryption standard contest.
It is the next generation of blowfish algorithm; this algorithm also works on Feistel
structure like the blowfish algorithm.

ISBN :978-81-945631-7-4

175
2.5 IDEA
IDEA is a symmetric block cipher algorithm which operates on a 64-bit block with
a 128-bit key, this algorithm was used as a replacement for DES algorithm, it consists
of 8 identical rounds and provides decent security to the data.

3 Proposed Methodology for Comparison

This paper takes five main types of encryption algorithms into account for analysis,
these algorithms are thoroughly analyzed based on raw data and data collected from
previous researches. The algorithms are analyzed both qualitatively and quantitatively
over certain parameters which play a crucial role in defining the quality and nature of
an encryption algorithm. Furthermore, the comparative analysis of the undertaken al-
gorithms is quantified by a fitness function which represents all the crucial technical
parameters under consideration to give out a fixed value for each algorithm.

3.1 Various Characteristic Parameters


Block size. Block size is the number of bits or bytes processed by a block cipher;
each encryption algorithm has a specific block size i.e. that algorithm can process
the number of bits equal to the block size in each step. The more the number of
blocks the more secure the ciphertext will be.

key size. is the amount of bits or bytes used to make a key for the algorithm to en-
crypt the data, key can be called an alphanumerical sequence which helps the algo-
rithm to frame the cipher from the plain text and the same key is further required to
descramble the ciphered data, key is nothing but a lock, different encryption algo-
rithms use different sized keys, some algorithms are flexible regarding size of keys
and have multiple options for size of keys, the size of key plays a very important role
in deciding the strength of an encryption algorithm we can say that the encryption
strength is directly proportional to the size of the key because as the length of the
key will be increased the chances of cracking the key by any means will be de-
creased.

Rounds. Rounds in encryption algorithms are defined as the iteration of a set of


operations on the given data multiple times, a single round consists of the set of
operations and which are specifically defined for each encryption algorithm explic-
itly. Also, each of the discussed algorithms has a definite round sequence as per the
definition of that specific algorithm. Number of rounds of a particular encryption
algorithm directly reflects the complexity of the output cipher data from that algo-
rithm, in other words, we can say that the provided normal input sequentially passes
through the rounds adds more and more complexity to the cipher and will make it

ISBN :978-81-945631-7-4

176
quite difficult to decrypt, although having more number of rounds can increase time
overhead for the algorithm and it may be possible that for larger chunk of data the
algorithm may take a tremendous time to encrypt.

Avalanche effect. Avalanche effect is a desirable property of a cryptographic algo-


rithm typically for block-cipher based algorithms. It says that if a single bit or byte
in the input plain text is changed then there should be a considerable change in the
output cipher. This parameter is so far the most crucial parameter which defines the
quality of an encryption algorithm. In the case of the quality of block ciphers, such
a small change in either the key or the plaintext should cause a drastic change in the
ciphertext. A good cipher must satisfy avalanche> 50% moreover, it is suggested to
use more than one test case and take the average value of the avalanche effect.

Encryption Time. Encryption time is the time required by the encryption algorithm
to encrypt the plain text to ciphertext, encryption time should be less as it reflects
the performance of the algorithm.

Decryption Time. Decryption time is the time required by the algorithm do decrypt
the cipher using the same key, this time must be less than encryption time, it also
depends upon the key size and the ciphertext size.

3.2 Fitness Function


The fitness function is introduced to quantize the overall characteristic parameters
taken into consideration above, into a value to arrive on a single point of conclusion for
the result. The fitness function is the implementation of the weighted sum model of
multiple criteria decision analysis methods. Due to the non-monotonicity of the char-
acteristic parameters of encryption algorithms concerning the size of the input plain
text, we analyzed the fitness function of the algorithms for different input sizes and
calculated individual fitness values.
F = fitness value
B = block size
K = key size
R = rounds
E = encryption time
D = decryption time
A = avalanche effect

F = [ 0.4K + 0.5A + 0.3(B+R) + {(E+D)/E*D} *1000]

All the weights associated with the parameters are decided based on the priority of
that particular factor in the analysis of the algorithm.

ISBN :978-81-945631-7-4

177
We have given the most priority to the avalanche effect because the avalanche effect
defines the randomness of the ciphertext concerning the change in plain text.
Key is the second most prior thing in deciding the quality of the encryption algo-
rithm, the larger the size of the key the lesser it will be prone to brute force or other
attacks. Apart from key size and avalanche effect the block size and rounds of the iter-
ation are the aspects that describe the performance of the algorithm during the runtime
of encryption and decryption.
Encryption time and decryption time are system dependent and may vary with the
system configuration but relative values remain almost constant and encryption, de-
cryption time shows the significance of the performance of the algorithm, encryption
and decryption time are inversely proportional to the performance of the algorithm/

Data Interpretation. The data of encryption time, decryption time and avalanche ef-
fect shown below in table 1, had been obtained by running tests for different file sizes
and data strings respectively on an intel i5 9th generation processor clocked at
2.40ghz. we used NetBeans IDE for algorithm implementation using java cryptog-
raphy extension and bouncy castle API.

Table 1. Encryption and Decryption time of algorithms for different file sizes
10 KB 100 KB 1 MB 10 MB
ALGORITHM E D E D E D E D
(Ms) (Ms) (Ms) (Ms) (Ms) (Ms) (Ms) (Ms)

AES 667 0202 0663 0220 0695 0291 0746 0500


3DES 990 0263 1020 0291 1206 0531 1650 1082
BLOWFISH 1086 0276 1198 0324 1032 0450 1340 0719
TWOFISH 1152 0281 1050 0308 1099 0473 1292 0802
IDEA 1234 0301 1032 0308 1054 0401 1207 0914

All the characteristic parameters are shown in table (2) depend upon the design of
algorithm some of the parameters have the flexibility to attain more than one value, we
have taken a single value of each parameter for more accurate and precise analysis and
the same values have been used for obtaining the dependent data.

Table 2. Value of various parameters of each algorithm used for testing and data generation
purposes.

Algorithm Key size Avalanche Block Rounds


effect (%) size
AES 256 72.34 128 14
3DES 168 55.50 64 48
BLOWFISH 256 56.57 64 16
TWOFISH 256 70.33 128 16
IDEA 128 56.13 64 8

ISBN :978-81-945631-7-4

178
The data tabulated in the above tables are further used for the calculation of the
fitness function. The values of the function are tabulated below (the values are rounded
up to their nearest integer values for convenience).

Table 3. values of the fitness function for different file sizes

Fitness function
Algorithms (F)
10kb 100kb 1mb 10mb
AES 188 187 186 184
3DES 133 133 131 130
BLOWFISH 159 157 158 156
TWOFISH 185 184 183 182
IDEA 104 105 104 102

4 Result and Analysis


In this section, we will discuss the result obtained by the analysis of the undertaken
factors.

4.1 Fitness Trends

AES 3DES BLOWFISH TWOFISH IDEA


188 185 187 184 186 183 184 182
159 157 158 156
133 133 131 130
104 105 104 102

10KB 100KB 1 MB 10MB

Fig. 1. fitness function vs file size for different algorithms

Figure 1 shows what the fitness function concluded: The best algorithm for encryp-
tion is AES for all the four ranges of data size the second one is TWOFISH algorithm,

ISBN :978-81-945631-7-4

179
as the fitness function is attaining the second-highest value for TWOFISH for all four
file sizes, the two fish algorithm was the finalist in advanced encryption standard con-
test the winner was AES algorithm after TWOFISH comes to BLOWFISH then 3DES
and then IDEA

4.2 Encryption and Decryption Time


As per the needs of the end-user of the algorithm, one must need to know the re-
quirements and available trade-offs' which most commonly in the field of cryptography
is of encryption and decryption time. Below we discuss the performance of the algo-
rithms concerning their encryption and decryption time.

Encryption time.

2000
1500

1000

500

0
10KB 100KB 1MB 10MB

AES 3DES BLOWFISH TWOFISH IDEA

Fig. 2. Encryption time vs File size

As far as encryption time is concerned AES algorithm proves to be the least encryp-
tion time taking algorithm for all file sizes with the maximum value of 746ms for 10mb
file and 667ms for a 10 kb file. After AES, 3DES is the second least time taking en-
cryption algorithm with 990ms for a 10kb file and 1020ms for a 100kb file. In 1mb and
10mb file size blowfish is proved to be more efficient than 3DES.

ISBN :978-81-945631-7-4

180
Decryption time.

1200
1000
800
600
400
200
0
10kb 100kb 1Mb 10Mb

AES 3DES BLOWFISH TWOFISH IDEA

Fig. 3. Decryption time vs File size

For decryption time AES tops the rest as it takes a minimum time 0f 202ms for a
10kb file to decrypt and a maximum of 500ms for a 10mb file to decrypt. After AES
there is a 3DES algorithm that has the second least decryption time for 10kb and 100
kb file range and then blowfish for 1mb and 10 Mb file range. 3DES takes the highest
value among all others in the 10 Mb file range.

4.3 Avalanche Effect

80
70
60
50
40
30
20
10
0
avalanche effect
AES 3DES BLOWFISH TWOFISH IDEA

Fig. 4. Avalanche effect of given algorithms

ISBN :978-81-945631-7-4

181
The highest avalanche effect is shown by the AES algorithm with 73% and then the
second-highest avalanche effect is shown by the TWOFISH algorithm with 70% after
TWOFISH there are BLOWFISH, IDEA and then 3DES, the least avalanche effect is
shown by 3DES of 55%.

Table 4. Average scaling of algorithms

Algorithm Average value of fitness function F


AES 186.25
3DES 131.75
BLOWFISH 157.5
TWOFISH 183.5
IDEA 103.75

AES > TOWFISH > BLOWFISH > 3DES > IDEA

200
180
160
140
120
100
80
60
40
20
0
AES 3 DES BLOWFISH TWOFISH IDEA

Fig. 5. Average values of the fitness function

As per the average values of the fitness function, we can say that the AES algorithm
is the best encryption algorithm with the value 186.25, and the one with the least value
i.e. IDEA is least preferable encryption algorithm.

ISBN :978-81-945631-7-4

182
5 Conclusion and Future Work

We conclude that we have proposed a noble approach for the comparison and anal-
ysis of the algorithm using Fitness function. Accordingly, AES has proved to be the
best encryption algorithm when compared overall. The rating of each of the algorithms
is done based on the average value of fitness function.
The work carried out on the various algorithms will help any technical or nontech-
nical personality to understand the significance of encryption algorithm in the field of
data security, the analysis carried out here based on the quantization of characteristic
parameters can be stretched to a new level of limits which can include space complex-
ity, byte entropy and many other factors which can describe the algorithm more accu-
rately and precisely. As mankind has now taken the computational power to a new level
where there is a threat to the stored data, and thus there is a need to make it more secure
and protected, encryption algorithms play a key role in the protection of the digital data.
The algorithms are in a need of refurbishment and reanalysis, the work carried out here
might be just a step, there are a lot more things to do.

References

1. Seth, S., Mishra, R.: Comparative Analysis Of Encryption Algorithms For Data
Communication. International Journal of Computer Science and Technology. 2, 292-
294 (2011).
2. Alanazi, H., Zahidan, A., Bahaa, B., shabbir, M., Al-Nabhani, Y.: New Comparative
Study Between DES, 3DES, and AES within Nine Factors. Journal of Computing.
2, 152-157 (2010).
3. Chennam, K., Muddana, L., Aluvalu, R.: Performance analysis of various encryption
algorithms for usage in multistage encryption for securing data in the cloud. 2017
2nd IEEE International Conference on Recent Trends in Electronics, Information &
Communication Technology (RTEICT). (2017).
4. Joseph, D., Krishna, M., Arun, K.: Cognitive Analytics and Comparison of Symmet-
ric and Asymmetric Cryptography Algorithms. 4th National Conference on Recent
Trends in Information. 6, (2015).
5. Patil, P., Narayankar, P., Narayan D.G., Meena S.M.: A Comprehensive Evaluation
of Cryptographic Algorithms: DES, 3DES, AES, RSA, and Blowfish. Procedia
Computer Science. 78, 617-624 (2016).

ISBN :978-81-945631-7-4

183
Multilayer Perceptron Using TFIDF for News Category Classification
Shivam Pandey1, Mrityunjay Singh2 and A K Shukla1
1Bundelkhand Institute of Engineering & Technology Jhansi, U.P., India
2Jaypee University of Information Technology, Waknaghat, Solan, H.P., India

vastavshiv@gmail.com, mrityunjay.cse045@gmail.com, anjanishkl2@gmail.com

Abstract. With the exponential growth of World Wide Web, it has


become very laborious for humans to grasp all of the enormous data
generating and classify it into classes. With such massive growth of
knowledge and concurrent growth of obtainable computing ability
automatic classification of information, especially textual information,
gains progressively high importance. Text categorization (also referred to as
topic identification) means automatically sorting a group of texts into
classes from a built-in set. It has several applications like indexing of
scientific articles, spam classification, web page classification, news
category classification, etc. This work addresses the problem of automatic
online news articles classification using artificial neural network, multilayer
perceptron algorithm. The textual information can be stored or retrieved as
in the form of text such as newspaper articles, web pages, e-mails, etc. The
online news papers present news under the classes like entertainment,
finance, international, national, etc. It is a very prolonged task to give one
class to a news article from a large number of news sports, politics articles.
In order to rapid retrieval of information, the simple approach is the news
categorization. The algorithm presented in this work is appropriate to
manage the English language in which distinctive news classes for example
entertainment, business, technology, sports and so forth are considered.

Keywords: Information, Knowledge, News, Neural Network, Text Categorization.

1. Introduction
Text classification is the mechanism through which one can allocate one or more specified
categories to text files that makes user to easily access useful information rapidly by
looking for the specific categories only instead of searching in complete whole knowledge
space. The text classification is more significance when we want to retrieve information
from a massive knowledge space, e.g., World Wide Web [1][2][3]. There are many
machine learning algorithms are available for the text classification such as artificial
neural network (ANN), Support Vector Machine (SVM) etc. The ANNs consist of various
nodes that simulate human brain having biological neurons; these neurons are connected
with each other and interact with the help of connected links. The nodes take data as input
and perform elementary data operations; the output elementary data operation is called
node or activation value for each node. These activation values are given as an input to
other neurons [4].

A perceptron is a linear classifier that generates a single output based on various real
examined inputs by forming a linear activation using its input weights (and sometimes the

ISBN :978-81-945631-7-4

184
output is passed by a nonlinear activation function). This is how it is written in
mathematics:

Where w is a weight vector, x and b denotes input vector and bias respectively, and is a
non - linear activation function.

A multilayer perceptron (MLP) is a deep neural network with multiple perceptron. MLP
consist of an input layer for receiving the input signals, an arbitrary number of hidden
layers that having the most significant computing power, and an output layer for
prediction with respect to the given input. In order to minimize the errors, we train the
MLP network by adjusting the model's parameters or weights and biases. We use the
backpropagation algorithm to adjust the weight and bias with respect to the error; this
error can be calculated using various methods such as root mean squared error (RMSE).
In this work, we are provided with a News dataset consisting of News Headlines, News
description and the Category of each Document (News). Our task is to design a model
capable of correctly detecting News categories.

● Design a model capable of analyzing data and metadata related to each News headline and
assigning a category to the headline.
● Each entry has a news headline and a category among others.
● The model thus trained should be able to generalize to a set of not-yet annotated News
Headlines: The model is expected to predict the correct News Headline category of data
not necessarily belonging to the same source of the News Headlines dataset.
● Our task is to identify the category of a news headline from a fixed category set.

2. Related work
Ribana Roscher et. al. (2009) have introduced Bounded Logistic Regression (BLR) to
addres convex optimization problem; this techniques is the extension of logistical
regression problem. The authors have compared their work with support vector machine
(SVM) classifier, and test the accuracy of BLR's on nine well-known datasets [5].

Liang C. Yu et al. (2013) have proposed a conceptual entropy model for the online stock
market news articles to enhance seed words by evaluating similar sentimental words and
their respective severity. Using an entropy measure, they covered the relevance of their
conceptual distribution between seed words and applicant words. Their approach was
regarded as both conceptual distribution and co-occurrence strength, thereby encouraging
more relevant sentimental words, less noisy words and exceeding Point-wise Mutual
Information (PMI) that conceives co-occurrence [6].

Yanghui Rao et al. (2014) present an algorithm and pruning strategy to create a word level
sentiment dictionary for social sensitivity detection. In the dictionary, the words are
associated with a special exemption for a series of human feelings and also added a topic-
based modeling method for building a topic-level dictionary in which social sentiments

ISBN :978-81-945631-7-4

185
are associated with each topic. The approach-generated dictionary is fine grooved, volume
unbounded and language independent when compared to other lexicons. The final
dictionary has several applications such as predicting news articles, distributing emotions,
etc[7].

Limeng Cui et al. (2014) have introduced a hierarchy model based on LDA and SVM, and
introduced a topic model that has significance for news classification; they introduced the
SVM concepts by adjusting the algorithm parameters [8].

Shivam Pandey (2017) extended the issue of classifying the genre of different English
novels with the help of different Natural Language Processing and Machine Learning
methods. The genres that have been taken are some of the most widely read genres of
book among different age groups. Using the different linguistic feature to obtain
representative features for the genres. The training module uses the feature Datasets to
provide the base for classification feature [9].

3. Methodology
In this work, we use anaconda 4.6.11 with spyder 3.3.2, python version 3.7.1, Keras 2.1.6
(with TensorFlow backend). Along with this, we have also installed a few needed python
packages like numpy, scipy, sci-kit-learn, pandas, ntlk, spacy, etc.

The whole process is divided into parts first carrying out the cleaning process using
natural language processing then a calculation of frequencies for all keywords [10] and
lastly doing the training part using neural networks for prediction of news article’s
category.

4.1 Natural Language Processing & Understanding Text:

We would not go directly from raw text to fit a machine learning or model of deep
learning. We therefore first clean our text, which means separating it into words and
processing punctuation and case. We mainly used two python libraries nltk and spacy for
natural language processing. Nltk is a library for string processing. Strings are required as
input and strings are returned output. Whereas, spacy returns a document object whose
words and sentences are objects themselves.

ISBN :978-81-945631-7-4

186
Fig.1 Example of removal of accented characters [11].

Our text preparation steps are removal of accented characters, expanding contractions,
removing special characters, stemming, and removing stop words. In the first step, we
convert the accented characters into ASCII characters and standardized them as shown in
Fig.1. Expanding Contractions step, we convert contraction to its expanded form, the
original form helps with text standardization, e.g., don’t to do not and I’d to I would etc.
Removal of Special Characters step,the Special characters and symbols are removed using
simple regular expressions (regexes) that usually add extra noise in data that can be non-
alphanumeric characters. In Stemming step, the words are converted to their base forms.
Finally, in Stopwords removal step, the Words with little or no value are generally words
with the maximum frequency. These can typically be articles, prepositions, conjunctions,
etc. A, an, the, and, the like are some examples of stop words. Fig.2 exhibits an example
of removal of stopwords from a small paragraph, and it is converted to its clean form
using all these functions[11].

Fig.2 Example of a paragraph converted to its clean form using Natural Language
Processing [11].

4.2 Model Architecture:

Here we are using 5 newsgroups dataset containing around 2000 data which we have
taken from AI Academy Intermediate Class Competition, Kaggle. The categories are as
shown in Fig.3 and Fig.4 shows a comparison of the number of values for each category.

Fig.3 Number of news headlines for each news category in our dataset.

First of all, we import all the required packages [12] then load data to python variables
then we split data for training and testing 80% and 20% respectively. The variables of our
model are training data, testing data, numbers of labels, etc. are shown in Fig.5. Then
tokenizing and preparing of vocabulary comes into action, we are using Bag of Words
method [13] and now the Keras comes with its inbuilt tokenizer which converts text to
numeric vector based on tfidf.

ISBN :978-81-945631-7-4

187
After converting text to numeric vectors, to make sure our labels in the numeric format are
accepted by neural network we need to convert them to one hot vector for which we use
sklearn’s LabelBinarizer class which converts multi-class labels to binary
class[14][15][16].

Fig.4 Comparison of the number of values for each category

4.2.1 Term Frequency-Inverse Document Frequency

We combine the probability distribution (Pr) with a fraction of records related to each
class. In order to avoid underflow, we use the sum of logs:

Where, j denotes a class, i denotes a word, f denotes a word frequency.

ISBN :978-81-945631-7-4

188
One issue is that, for the repeating words, the probability will increase. In order to address
this issue, we take the log of the frequency for its smoothing:

Next, we add an Inverse Document Frequency (IDF) weight on each word in order to take
stop words into account:

For this use case, we have already set the stop words to 0 and add the IDF implementation
to generalize the function. As we can see, the IDF has little effect on the removal of the
stop words. Smoothing, however, makes the model more accurate. Therefore, our optimal
model is:

4.2.2 Neural Networks Architecture and Topology

Keras is a high-level neural network API written in Python that has ability to run on the
top of Tensorflow. Therefore, we use Keras API for training purpose. We use the
following steps:

1. Keras Sequential Model: the Keras sequential model is a linear stack of layers. In this
work, we use three layers with softmax as the activation function.
2. Input Shape: We use 2D layers, such as dense layer and take vocab size of 10000 as input
shape.
3. Compilation: We need to configure the learning process before training our model, which
is performed using the compile method, the compilation method requires three arguments
as an input, these arguments are:

• Optimizer: We use Adam optimizer, which is an algorithm to a gradient-based first-order


optimization of stochastic objective functions based on lower order adaptive estimates.

• Loss Function: We use cross-entropy classifier function to minimize the two distributions:
the estimated distribution q(x), and the true distribution p(x), defined over the discrete
variable x. the cross-entropy classifier function is given by

ISBN :978-81-945631-7-4

189
• List of Metrics: A metric can be an existing metric string identifier or a custom metric
function. It is set to accuracy for any classification.

4. Training: we train the Keras models on input data, numpy arrays, and labels. We use the fit
function for training with validation split of 0.2, batch size of 100, and 5 labels.
5. Evaluate: Returns the loss and metric value for the model in test mode. Computation is
done in batches.
6. Predict: It generates output predictions for the input samples [17].

We build the model, by taking 1780 samples for training and 445 to validate, then fit it
and save the trained model. Figure Fig.5 shows the number of datasets for training and
validation.

Fig.5 Variables in the model like the number of labels, test data, train data, etc.

5 Results
When the model is trained on 1424 samples and validated on 356 samples we obtained the
training accuracy of 97.75 % whereas test accuracy of 96.85% which is shown in Fig.6.

Fig.6 Training Accuracy and Testing Accuracy

ISBN :978-81-945631-7-4

190
The ANN model thus build predicts the categories like entertainment, technology,
business, politics, sports correctly which is evident by the screenshots of the outputs. The
predicted labels for the news input by the user are shown in the following figures like in
Fig.7 an input is given for a news description taken from a news article of Bollywood on
the internet and the output i.e. predicted label obtained is of the category, entertainment.
Similarly for the news description of growth in chemical and engineering sectors gives the
predicted label, business in Fig.8 and for the news article related to elections, it gives the
category, politics as shown in Fig.9 and likewise it shows the categories of sports and
technology for respective inputs.

Fig.7 Prediction for news category: entertainment

Fig. 8 Prediction for news category: business

Fig.9 Prediction for news category: politics

By examining these outputs we observed that predicted categories by the model for the
given inputs of news description are correct.

6 Conclusion

ISBN :978-81-945631-7-4

191
In this work, we use the multilayer perceptron, a deep learning based artificial neural
network for news category classification. We conclude that the ANN model thus trained is
an efficient model as examined by performance metrics like Precision, recall and F1 score
as shown in Fig.10. Here we find a very low variation in the values of precision and recall
for all the categories and all the values in precision, recall, and F1 score are nearly 1 or
equal to 1 which shows the effectiveness of the model.

Fig.10 Precision, Recall, F1 Score

Fig.11 shows the confusion matrix that summarizes the performance of our classification
model. Here the total number of correct predictions for a class goes into the expected row
for that class value and the predicted column for that class value.

Fig.11 Confusion matrix

Lastly, the complete classification report in Fig.12 which shows the summary of all the
performance measures that are stated above.

ISBN :978-81-945631-7-4

192
Fig.12 Classification report for the ANN Model

Future works will focus on other neural network models like Long Short Term Memory
Units (LSTMs), Backpropagation and feedforward algorithms. Even better results are
expected since they are more optimized for learning sequential data. Other future works
will focus on distinguishing fake news from real news using convolutional neural
networks, it can be implemented for online news classification or for customizing articles
reading online experience by classifying them as interesting or non-interesting with more
improvements with methods and precision. Therefore, it can enhance the experience of
reading news online by making it more real, precise and personalized.

Acknowledgements The authors wish to place on record their sincere thanks to the
referee for his valuable comments and suggestions. The authors would like to thank to
AICTE for financial support under the project No. 1-57738052191, under CRS scheme by
AICTE.

References
1. Chan Chee-Hong, Sun Aixin, Lim Ee-Peng: Automated Online News Classification with
Personalization, Center for Advanced Information Systems, Nanyang Technological
University Nanyang Avenue, Singapore, 639798, (2001).

2. Jayanthiladevi A., Murugan S., Manivel K.: chapter 18 Text, Images, and Video Analytics
for Fog Computing, IGI Global, (2018).

3. Wei Yu-Chen, Lu Yang-Cheng, Chen Jen-Nan, Hsu Yen-Ju: Informativeness of the market
news sentiment in the Taiwan stock market Published in: The North American Journal of
Economics and Finance, Volume 39, pp: 158–181, January (2017).

ISBN :978-81-945631-7-4

193
4. Ai-Sun, Li Yingjian, Huang Yueh-Min, Li Qiong, Lu Guangming: Efficient facial
expression recognition system based on geometric features using neural network,
Information and Communication Technology for Sustainable Development, Springer,
Singapore, page 181-190, (2018).

5. Roscher Ribana, Forstner Wolfgang: Multiclass Bounded Logistic Regression – Efficient


Regularization with Interior Point Method, Technical Report Nr. 2, Department of
Photogrammetry Institute of Geodesy and Geoinformation University of Bonn, (2009).

6. Yu Liang-Chih, Wu Jheng-Long, Chang Pei-Chann, Chu Hsuan-Shou: Using a contextual


entropy model to expand emotion words and their intensity for the sentiment classification
of stock market news, Knowledge-Based Systems, (2013).

7. Rao Yang hui, Lei Jingsheng, Wenyin Liu, Li Qing, Chen Mingliang: Building emotional
dictionary for sentiment analysis of online news, Published in World Wide Web, Issue 4,
Volume 17, pp: 723–742, July (2014).

8. Cui L., Meng F., Shi Y., Li M., Liu A. : A Hierarchy Method Based on LDA and SVM for
News Classification, in Proc. 2014 IEEE International Conference on Data Mining
Workshop, ICDM Workshops 2014, pp: 60-64, Shenzhen, China, 14 December (2014).

9. Pandey Shivam: Information Retrieval and Document Classification, International Journal


of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September
(2017).

10. Singh Amritpal, Chhillar Sunil Kumar: News Category Classification Using Distinctive
Bag of Words and ANN Classifier, International Journal of Emerging Research in
Management &Technology ISSN: 2278-9359 (Volume-6, Issue-6), (2017).

11. https://towardsdatascience.com/a-practitioners-guide-to-natural-language-processing-part-i-
processing-understanding-text-9f4abfd13e72.

12. Sarkar Dipanjan, Bali Raghav, Sharma Tushar: Practical Machine Learning with Python,
Springer Nature, (2018). https://doi.org/10.1007/978-1-4842-3207-1.

13. Li-Juan Z., Feng Z., Qing-qing P., Xin Y., Zheng-tao Y.: A classification method of
Vietnamese news events based on a maximum entropy model, in Proc. 2015 34th Chinese
Control Conference (CCC), ISBN: 978-1-4673-7443-9, pp: 3981-3986, Hangzhou, China,
28-30 July (2015).

14. Tripathi Ankita, Pandey Shivam, Jangir Hitesh: Efficient facial expression recognition
system based on geometric features using neural network, Information and
Communication Technology for Sustainable Development, page 181-190, Springer,
Singapore, (2018).

15. Sebastiani F.: Machine learning in automated text categorisation: a survey, Technical
Report IEI-B4-31-1999, Istituto di Elaborazione del l'Informazione, Consiglio Nazionaled
elle Ricerche, Pisa, IT, 1999.Revised version, (2001).

ISBN :978-81-945631-7-4

194
16. Kiliç E., Tavus M. R., Karhan Z.: Classification of breaking news taken from the online
news sites, in Proc. 2015 23rd Signal Processing and Communications Applications
Conference (SIU), ISBN: 978-1-4673-7387-6, pp: 363-366, Malatya, Turkey, 16-19 May
(2015).

17. https://keras.io/getting-started/sequential-model-guide/

ISBN :978-81-945631-7-4

195
ISBN : 978-81-945631-7-4

Published by
FAI Publications
www.faipublications.com

View publication stats

You might also like